• Title/Summary/Keyword: User protection

Search Result 691, Processing Time 0.022 seconds

A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization

  • Chen, Lu;Tang, Hongbo;Zhao, Yu;You, Wei;Wang, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2490-2506
    • /
    • 2022
  • In Mobile Edge Computing (MEC), attackers can speculate and mine sensitive user information by eavesdropping wireless channel status and offloading usage pattern, leading to user privacy leakage. To solve this problem, this paper proposes a Privacy-preserving and Energy-efficient Offloading Algorithm (PEOA) based on Lyapunov optimization. In this method, a continuous Markov process offloading model with a buffer queue strategy is built first. Then the amount of privacy of offloading usage pattern in wireless channel is defined. Finally, by introducing the Lyapunov optimization, the problem of minimum average energy consumption in continuous state transition process with privacy constraints in the infinite time domain is transformed into the minimum value problem of each timeslot, which reduces the complexity of algorithms and helps obtain the optimal solution while maintaining low energy consumption. The experimental results show that, compared with other methods, PEOA can maintain the amount of privacy accumulation in the system near zero, while sustaining low average energy consumption costs. This makes it difficult for attackers to infer sensitive user information through offloading usage patterns, thus effectively protecting user privacy and safety.

A Study on the Estimation of User′s Psychological Carrying Capacity in Mt. Chi-ak National Park Campsite (치악산국립공원 야영장의 이용자의 심리적 수용능력 추정에 관한 연구)

  • 권영선;이경재;송근준
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.16 no.1
    • /
    • pp.1-12
    • /
    • 1988
  • ^x This study was executed to measure the user's psychological carrying capacity in the National Park Campsite in the district of Temple Ku- Ryong as a model of analysis, which is made socio - psychological approach. The results are as follows ; 1. Since this Place hart a beautiful scenery and some cultural assets prosperties and lies near the metroplitan area, 67.5% of the user come from the district, such as Seoul, Inchon, Kyong - Ki Do, and the purpose of camping is to appease their stress and to promote friendly relationship one another. 2. Since most of the campers(86%) didn't recognize the injury of the natural environment, the enlightment movement and the public information for the protection of natural environment are urgent. And they thought that the good campsite is located near the stream(43.6%) or a quiet place(33.4%). 3. As the space per a man increase, the degree of their satisfactions showed the tendency to increase. The user's satisfaction were analyzed by three statistic methods, correlation, multiple regression and factor analysis. Affecting factors to the user's psychology by the varimax varimax rotated factor analysis were classified physical arts ecological satisfaction. 4. The carrying capacity of the campsite by the degree of psychological satisfaction of the user was measured. The result was that the proper space for one user campsite was 35m$^2$ 5. The 58% of the informants said that they root disturbed by the overcrowding in the campsite. But most of the users thought that it was not good to control the number of the users. And the 67.3% of the respondents answered that the best method was that we control the number of the users by order of arrival if we have to control it.

  • PDF

Awareness of Personal Information Protection for Service Users among Small and Mid-Sized Security Companies (중.소민간경비업체의 서비스 이용자 개인정보보호에 관한 인식)

  • Kim, Il Gon;Choi, Kee Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.3-12
    • /
    • 2014
  • The government was fully aware of the gravity of a recent massive leak of personal information of credit card users. Meanwhile, the government just took a light disciplinary action by imposing a fine, but it showed its intention to strengthen the regulations by taking the severest disciplinary action. The tightened regulations against personal information leak will be applied to the private security industry without exception to protect individual people's property and lives if such an incident occurs in that industry that deals with a wide variety of personal information such as CCTV data or privacy information all the time. The purpose of this study was to examine the state of the protection and management of personal information for service users among private security firms in an effort to suggest some reform measures. The findings of the study were as follows: First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

Design and Implementation of an Automated Privacy Protection System over TPM and File Virtualization (TPS: TPM 및 파일 가상화를 통한 개인정보보호 자동화 시스템 디자인 및 구현)

  • Jeong, Hye-Lim;Ahn, Sung-Kyu;Kim, Mun Sung;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.2
    • /
    • pp.7-17
    • /
    • 2017
  • In this paper, we propose the TPS (TPM-enhanced Privacy Protection System) which is an automated privacy protection system enhanced with a TPM (Trusted Platform Module). The TPS detects documents including personal information by periodic scanning the disk of clients at regular intervals and encrypts them. Hence, system manages the encrypted documents in the server. In particular, the security of TPS was greatly enhanced by limiting the access of documents including the personal information with regard to the client in an abnormal state through the TPM-based platform verification mechanism of the client system. In addition, we proposed and implemented a VTF (Virtual Trusted File) interface to provide users with the almost identical user interface as general document access even though documents containing personal information are encrypted and stored on the remote server. Consequently, the TPS automates the compliance of the personal information protection acts without additional users' interventions.

A Study on Librarians' Perception of Library User Privacy (도서관 이용자 프라이버시에 대한 사서인식 조사연구)

  • Noh, Younghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.3
    • /
    • pp.73-96
    • /
    • 2013
  • This study investigates how librarians view library user privacy. To this end, a four-part survey was conducted: respondents' opinions about the privacy of library users, the degree to which library records violate the users' privacy, the role libraries and librarians fulfill to ensure user privacy protection, and librarians' need for privacy education. Results showed that librarians were very aware of privacy issues, but they perceived that library users' privacy awareness was not high. In particular, they had little knowledge of what library records or which library tasks might have the potential to violate users' privacy. In addition, awareness efforts of librarians to ensure user privacy was very low. On the other hand, the need for library user privacy educational programs was shown to be very high, and the willingness to participate was also relatively high.

User Privacy management model using multiple group factor based on Block chain (블록 체인 기반의 다중 그룹 요소를 이용한 사용자 프라이버시 관리 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.107-113
    • /
    • 2018
  • With the rapid development of big data and Internet technologies among IT technologies, it is being changed into an environment where data stored in the cloud environment can be used wherever the Internet is connected, without storing important data in an external storage device such as USB. However, protection of users' privacy information is becoming increasingly important as the data being processed in the cloud environment is changed into an environment that can be easily handled. In this paper, we propose a user-reserving management model that can improve the user 's service quality without exposing the information used in the cloud environment to a third party. In the proposed model, user group is grouped into virtual environment so that third party can not handle user's privacy information among data processed in various cloud environments, and then identity property and access control policy are processed by block chain.

Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Khudaybergenov, Timur;Kim, Min Soo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • The secure access the lighting, Heating, ventilation, and air conditioning (HVAC), fire safety, and security control boxes of building facilities is the primary objective of future smart buildings. This paper proposes an authorized user access to the electrical, lighting, fire safety, and security control boxes in the smart building, by using color grid coded optical camera communication (OCC) with face recognition Technologies. The existing CCTV subsystem can be used as the face recognition security subsystem for the proposed approach. At the same time a smart device attached camera can used as an OCC receiver of color grid code for user access authentication data sent by the control boxes to proceed authorization. This proposed approach allows increasing an authorization control reliability and highly secured authentication on accessing building facility infrastructure. The result of color grid code sequence received by the unauthorized person and his face identification allows getting good results in security and gaining effectiveness of accessing building facility infrastructure. The proposed concept uses the encoded user access authentication information through control box monitor and the smart device application which detect and decode the color grid coded informations combinations and then send user through the smart building network to building management system for authentication verification in combination with the facial features that gives a high protection level. The proposed concept is implemented on testbed model and experiment results verified for the secured user authentication in real-time.

The Brain Temperature Change after the Use of Mobile Phone (휴대전화 사용 후 뇌 온도의 변화)

  • Koo, Eun-Jung;Lee, Il-Keun;Kong, Hea-Won
    • Annals of Clinical Neurophysiology
    • /
    • v.5 no.1
    • /
    • pp.16-20
    • /
    • 2003
  • Background: Mobile phone has become a very popular device used in everyday our lives. However, the possible hazard to human body such as brain tumor has been proposed intermittently. This unwanted possibility was calmed down due to the absence of definite evidence of hazard. This study was performed to see the effect of mobile phone use on the brain temperature. Methods: In 20 volunteers, we performed 4 steps of temperature measuring procedure. Four steps are pre-use (S1, basal state), wire-phone (S2, conventional telephone), PCS phone (S3, using 1,750~1,900 MHz), cellular phone (S4, using 820 MHz) states. Brain temperatures were measured by radiothermometer at 10 sites (5 sites in each hemisphere) of the brain after 5minutes of telecommunication through the phones. The final data were compared using paired t-test. Results: In PCS phone user group (Average; $35.73708^{\circ}C$), brain temperature decreased (with statistical significance, p<0.05), compared to those of non-user group (Average; $35.9527^{\circ}C$) or conventional wire phone user group. In cellular phone user group (Average; $35.82155^{\circ}C$), brain temperature decreased slightly (without statistical significance, p>0.05) compared to those of non-user group (Average; $35.9527^{\circ}C$) or conventional wire phone user group (Average; $35.922^{\circ}C$). The temperature change was not limited to the mobile phone applied side but on both hemisphere of the brain. Conclusion: In conclusion, mobile phone (especially PCS phone) decreased brain temperature in both hemispheres without side-to-side temperature difference. In addition, this study suggests possibility of radiothermometer application to the study of electromagnetic wave effect and protection method research in the future.

  • PDF

Anonymous Remote User Authentication Scheme with Smart Card (익명성을 제공하는 스마트카드 사용자 인증 프로토콜)

  • Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.139-144
    • /
    • 2007
  • Due to the increasing use of Internet and spread of ubiquitous environment the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users. In the study of authentication system using a smart card which is one of the methods for protecting private information, the main idea is to offer user anonymity. In 2004, Das et al. suggested an authentication system that guarantees anonymity by using a dynamic ID for the first time. However, this scheme couldn't guarantee complete anonymity as the identity of the user became revealed at log-in phase. In 2005, Chien at al. suggested a authentication system that guarantees anonymity, but this was only safe to the outsider(attacker). In this paper, we propose a scheme that enables the mutual authentication between the user and the sewer by using a smart card. For the protection of the user privacy, we suggest an efficient user authentication system that guarantees perfect anonymity to both the outsider and remote server.

Design and Implementation of Location Information System and User Mapping System using DSDV Routing Algorithm in Ad-hoc Network Environment (Ad-hoc 네트워크 환경에서 DSDV 라우팅 알고리즘을 이용한 위치 정보 시스템 및 사용자 맵핑 시스템의 설계 및 구현)

  • Kwak, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.3
    • /
    • pp.1-9
    • /
    • 2014
  • In this paper, we design and implement location information system and user mapping system using DSDV(Destination Sequenced Distance Vector) routing algorithm in ad-hoc network environment to efficient manage a number of mobile devices. The software part in proposed system construct ad-hoc network using DSDV routing algorithm and it activate alarm system, such as vibration, when one of devices disappears in the network. The hardware system, called u_LIN (User Location Information Node) construct ad-hoc network and it helps to find a disappeared device by using warning system. When we evaluate the performance of our prototype system, we have checked a correct operation, within the range of 250m in case of 1:1 communication and within the range of 100m in case of 1:N communication. The implemented system in this paper is highly expected to flexibly use in juvenile protection system, stray-child protection system, tourist guide system and so on.