• Title/Summary/Keyword: User Private Information

Search Result 363, Processing Time 0.019 seconds

Privacy Management Based on Profile for Personalized Services in u-City (u-City환경에서 맞춤형 서비스 제공을 위한 프로파일기반 개인 정보보호 관리)

  • Lee, Jun-Gyu;Kim, Ji-Ho;Song, Oh-Young
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.135-144
    • /
    • 2010
  • U-City pursues personalized service by collecting contexts through sensors located over the city and presenting the service automatically depending not on the user's request but on the situations that are needed. To provide the personalized service, however, contexts collected through various sensors are needed, and they include private information. Therefore, it is important to keep a balance between the convenience by presenting service and protecting private information. In this paper, we classify and grade person's various contexts requested in the personalized service environment. Based on these, we make decisions on whether to present the service or not by profile-matching between user profile and service profile. Also, we propose an efficient privacy-protection management scheme to encrypt transmitted private information and to control key distribution.

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

Framework Design of Pervasive Computing System for Inter Space Interactions between Private and Public Smart Spaces

  • Lim, Shin-Young;Chung, Lawrence;Helal, Sumi;Yang, Hen-I
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.9 no.3
    • /
    • pp.198-205
    • /
    • 2009
  • In this paper, design of framework architecture of pervasive computing system providing seamless inter space interactions between private and public smart spaces is presented. The seamless inter space interaction issues are related to establishing user's service environment by allocating relevant resources in a new location where there are no prior settings for the user or where there are current users already being served in the new location. In the realm of pervasive computing, we can have different types of smart spaces, offering proactive and intelligent services, which are islands of smart spaces independent from each other. As users move about, they will have to roam from private smart space to public smart space and vice versa. When they enter a new island of smart space, they will have to setup their devices and service manually to get the same or different services they had at the previous location. Users might be living in a non-pervasive computing environment because this manual operation is inappropriate to its generic features of proactive and intelligent services of pervasive computing. The framework architecture will provide seamless inter space interactions initiated by changes in users' location to acquire negotiations of resources for new and current residents regarding service provision with limited available networked devices.

Private Blockchain and Smart Contract Based High Trustiness Crowdsensing Incentive Mechanism (프라이빗 블록체인 및 스마트 컨트랙트 기반 고신뢰도 크라우드센싱 보상 메커니즘)

  • Yun, Jun-hyeok;Kim, Mi-hui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.999-1007
    • /
    • 2018
  • To implement crowdsensing system in reality, trustiness between service provider server and user is necessary. Service provider server could manipulate the evaluation of sensing data to reduce incentive. Moreover, user could send a fake sensing data to get unjust incentive. In this paper, we adopt private blockchain on crowdsensing system, and thus paid incentives and sent data are unmodifiablely recorded. It makes server and users act as watcher of each others. Through adopting smart contract, our system automates sensing data evaluation and opens to users how it works. Finally, we show the feasibility of proposing system with performance evaluation and comparison with other systems.

A Study on the Role of Private-led Information Provision: Case of COVID-19 Pandemic (코로나19 팬데믹 상황에서 살펴본 민간 주도 정보제공의 역할 분석)

  • Cho, Hosoo;Jang, Moonkyoung;Ryu, Min Ho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.1-13
    • /
    • 2021
  • With the global pandemic of COVID-19, it is pointed out that exposure to false information to the public could cause serious problems. However, in pandemic situations, there is also an positive effect for the public to share private-led information rather than centralized unilateral delivery of information. This study analyzes the role of private-led information provision in infectious disease situations. To this end, topic modeling and sentiment analysis is carried out on online reviews of all COVID-19-related applications in Google Playstore provided by the Korean government and the private. The results showed that the user's evaluation of private apps, which were used from the early stage of COVID-19, was much higher than the apps provided by the government. In particular, users responded more positively to private apps than government apps in all aspects such as reliability of information, risk avoidance, timeliness, usefulness, and stability. Based on these results, a post-monitoring system is recommended rather than a pre-block of all private apps.

How do multilevel privacy controls affect utility-privacy trade-offs when used in mobile applications?

  • Kim, Seung-Hyun;Ko, In-Young
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.813-823
    • /
    • 2018
  • In existing mobile computing environments, users need to choose between their privacy and the services that they can receive from an application. However, existing mobile platforms do not allow users to perform such trade-offs in a fine-grained manner. In this study, we investigate whether users can effectively make utility-privacy trade-offs when they are provided with a multilevel privacy control method that allows them to recognize the different quality of service that they will receive from an application by limiting the disclosure of their private information in multiple levels. We designed a research model to observe users' utility-privacy trade-offs in accordance with the privacy control methods and other factors such as the trustworthiness of an application, quality level of private information, and users' privacy preferences. We conducted a user survey with 516 participants and found that, compared with the existing binary privacy controls, both the service utility and the privacy protection levels were significantly increased when the users used the multilevel privacy control method.

A Research on the Use of DID Using a Private Blockchain (프라이빗 블록체인을 사용한 DID 활용 연구)

  • Park, Jong-Gyu;Kwon, Seong-Geun;Kwon, Ki-Ryong;Lee, Suk-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.760-767
    • /
    • 2021
  • The identity verification is one of the most important technologies in online services. Many services in society are provided online, and the service is provided after confirming the user's identity. Users can do a lot of things online, but they also have side effects. Online digital information is easily manipulated and it is difficult to verify its authenticity, causing social confusion. Accordingly, there has been a movement for individuals to directly manage their identity information using DID. In this paper, we propose a system that can authenticate identity by directly adding own personal information and issuing an identifier using DID technology based on a private blockchain. Then, to verify the proposed system, the scenario is executed and verified.

A Music Recommendation Method Using Emotional States by Contextual Information

  • Kim, Dong-Joo;Lim, Kwon-Mook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.10
    • /
    • pp.69-76
    • /
    • 2015
  • User's selection of music is largely influenced by private tastes as well as emotional states, and it is the unconsciousness projection of user's emotion. Therefore, we think user's emotional states to be music itself. In this paper, we try to grasp user's emotional states from music selected by users at a specific context, and we analyze the correlation between its context and user's emotional state. To get emotional states out of music, the proposed method extracts emotional words as the representative of music from lyrics of user-selected music through morphological analysis, and learns weights of linear classifier for each emotional features of extracted words. Regularities learned by classifier are utilized to calculate predictive weights of virtual music using weights of music chosen by other users in context similar to active user's context. Finally, we propose a method to recommend some pieces of music relative to user's contexts and emotional states. Experimental results shows that the proposed method is more accurate than the traditional collaborative filtering method.

Analysis of Privacy Vulnerability Caused by Location-Based Service (위치기반 서비스에 따른 개인정보보안 취약점의 사례분석)

  • Choi, Hee Sik;Cho, Yang Hyun;Kim, Jung Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.151-159
    • /
    • 2014
  • Recently, spread of large amount Smartphones made users to download location-based service applications, which provided by application developers. These location-based service applications are convenient tool for users. Location-based service use technology to find location of user and provide information of user's location. Leakage of information of user's location and expose of privacy life raised new controversy. In this thesis, it will analyze relations of increase of Smartphone market, usage of Location-based service and severity of personal information leakage. Also, it will analyze examples of user's case of damage which caused by leakage personal information and find solutions to reduce damage of personal information leakage. In research, it will find cases of damage that cause by Location-based service. Also it will analyze and research cases of damage and present with graph and chart. In conclusion, to reduce and prevent from damage which caused by leakage personal information, it is important that users and application developers to realize danger of private and personal information leakage. Also, user's personal information must deal with cautiously and application developers have to research and develop the application with powerful security.

A Countermeasures on the Hacking for the Internet Shopping Mall (인터넷 쇼핑몰의 해킹 사고에 대한 대응방법)

  • Lee, Young Gyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.33-43
    • /
    • 2008
  • As internet is spreaded widely, the number of cyber terror using hacking and virus is increased. Also the hacking to the internet shopping mall go on increasing. If the large shopping mall is attacked by the hacker, a number of user's information are exposed to the hacker. The private information as like a resident registration number, user's real name, the date of user's birth, the mobile phone number, the office phone number / address, the home phone number / address and so on include the information. These information are used in the phishing e-mails / call and spam. And them are selling and buying maliciously. The large internet shopping mall 'auction' was hacked in April, 2008. After the incident, this paper suggested a countermeasures on the hacking for the internet shopping mall. The technical item and political item are included among the countermeasures. The countermeasures can protect the hacking not only the internet shopping mall but also the web sites basically.