• Title/Summary/Keyword: digital privacy

Search Result 377, Processing Time 0.029 seconds

Big Data Security Technology and Response Study (빅 데이터 보안 기술 및 대응방안 연구)

  • Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.445-451
    • /
    • 2013
  • Cyber terrorism has lately aimed at major domestic financial institutions and broadcasters. A large number of PCs have been infected, so normal service is difficult. As a result, the monetary damage was reported to be very high. It is important to recognize the importance of big data. But security and privacy efforts for big data is at a relatively low level, therefore the marketing offort is very active. This study concerns the analysis of Big Data industry and Big data security threats that are intelligent and the changes in defense technology. Big data, security countermeasures for the future are also presented.

A Cryptography Algorithm using Telescoping Series (망원급수를 이용한 암호화 알고리즘)

  • Choi, Eun Jung;Sakong, Yung;Park, Wang Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

A Study on Improvement of Personal Identity Proofing Service(PIPS) Based on Alternative Methods of Resident Registration Number (온라인에서 주민등록번호 대체수단 기반의 본인확인서비스의 개선 방안 연구)

  • Kim, Jongbae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.29-42
    • /
    • 2019
  • As online services become more and more popular due to the development of IT, non-face-to-face transactions are continuously increasing rather than face-to-face transactions. The personal identity proofing service(PIPS) based on the alternative method of the resident registration number is used for the purpose of confirming the identity of the other party on the Internet. However, in the case of the current PIPS, the personal information of the PIPS user is excessively provided to the online service provider. As a result, privacy problems of online users, shortage of choice of information providing options, and lack of differentiation of authentication methods are becoming problems. Therefore, this paper proposes a method to improve the PIPS based on the current resident registration number alternative method and to provide a method to differentiate the provision of excessive personal information. In the proposed method, we analyze trends and current status of overseas online PIPS in order to provide a method of providing differentiation of personal information and proposes an effective improvement method applicable to domestic.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

Research Trends Analysis of Big Data: Focused on the Topic Modeling (빅데이터 연구동향 분석: 토픽 모델링을 중심으로)

  • Park, Jongsoon;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.1-7
    • /
    • 2019
  • The objective of this study is to examine the trends in big data. Research abstracts were extracted from 4,019 articles, published between 1995 and 2018, on Web of Science and were analyzed using topic modeling and time series analysis. The 20 single-term topics that appeared most frequently were as follows: model, technology, algorithm, problem, performance, network, framework, analytics, management, process, value, user, knowledge, dataset, resource, service, cloud, storage, business, and health. The 20 multi-term topics were as follows: sense technology architecture (T10), decision system (T18), classification algorithm (T03), data analytics (T17), system performance (T09), data science (T06), distribution method (T20), service dataset (T19), network communication (T05), customer & business (T16), cloud computing (T02), health care (T14), smart city (T11), patient & disease (T04), privacy & security (T08), research design (T01), social media (T12), student & education (T13), energy consumption (T07), supply chain management (T15). The time series data indicated that the 40 single-term topics and multi-term topics were hot topics. This study provides suggestions for future research.

A Study on Notification Method of Personal Information Usage History using MyData Model (마이데이터 모델을 활용한 개인정보 이용내역 통지 방안 연구)

  • Kim, Taekyung;Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.1
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the 4th industry, big data using AI is being used in many areas of our lives, and the importance of data is increasing accordingly. In particular, as various services using personal information appear and hacking attacks that exploit them appear in various ways, the importance of personal information management is increasing. Personal information must be managed safely even when collecting, retaining, using, providing, and destroying personal information, and the rights of information subjects must be protected. In this paper, an analysis was performed on the notification of usage history during the protection of the rights of information subjects using the MyData model. According to the Personal Information Protection Act, users must be periodically notified of the use of personal information, so we notify each individual of the use of personal information through e-mail or SNS once a year. It is difficult to understand and manage which company use my personal information. Therefore, in this paper, a personal information usage history notification system model was proposed, and as a result of performance analysis, it is possible to provide the controllability, availability, integrity, source authentication, and personal information self-determination rights.

Factors Influencing on the Intention to Use Serious Games for Healthcare: The Perspective of Valence Framework (건강 기능성 게임의 수용에 영향을 주는 요인: 감정가 프레임워크 관점)

  • Yong-Young Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.1
    • /
    • pp.97-112
    • /
    • 2024
  • In order to verify the factors affecting the acceptance of Serious Games for Healthcare (SGHs), this study developed a hierarchical model of general and specific benefit and risk factors affecting the intention to use SGHs based on the valence framework. As a result based on 199 samples, it was revealed that perceived customization and perceived schedule flexibility had a positive effect on the perceived benefits, which, in turn, had a positive effect on the intention to use SGHs. However, among the specific risk factors, only privacy risk had a positive effect on perceived risk, but it did not have a effect on SGHs usage intention. The results related to the fact that the survey respondents were potential users of SGHs and the bias that may overestimate the benefits provided by SGHs called optimistic bias. Based on these findings, some implications were presented such as the spread and distribution of SGHs to the ordinary persons, improvement of negative perceptions of games, and the need for data-based services to refine customized services for SGHs.

WebDG - A Platform for E-Government Web Services

  • Bouguettaya, Athman;Medjahed, Brahim;Rezgui, Abdelmounaam;Ouzzani, Mourad;Liu, Xumin;Yu, Qi
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.389-404
    • /
    • 2004
  • Web services are deemed as the natural choice for deploy- ing e-government applications. Their use enables e-government to fully get advantage of the envisioned Semantic Web. In this paper, we pro- pose WebDG, a comprehensive Web Service Management System for e-government applications. It aims to improve government-citizen inter- actions through an infrastructure built around the "life experience" of citizens. WebDG provides a framework for automatically composing e- government services, optimized querying services, and preserving privacy.

  • PDF

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare

  • Kim, Eun-Jin;Lee, Byeong-Tae
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.141-146
    • /
    • 2007
  • The importance of the net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of a well-implemented the net-based customer service are enhanced customer loyalty and higher lock-in of customers, and the resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such the net-based customer service. This is partly due to the e-commerce divide, and partly due to privacy and security concerns of the customer for sharing personal information with firms. The limited level of customer adoption of the net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We find that an increase in adoption of the net-based customer service by the customer base is not always desirable for firms. and that customers who utilize such services are better off only when the overall adoption is limited.

  • PDF

RSA에 사용된 파라메터들에 관한 고찰

  • 이희정
    • Journal for History of Mathematics
    • /
    • v.16 no.3
    • /
    • pp.101-108
    • /
    • 2003
  • The RSA cryptosystem is most commonly used for providing privacy and ensuring authenticity of digital data. 1'his system is based on the difficulty of integer factoring. Many attacks had been done, but none of them devastating. They mostly illustrate the dangers of improper use of RSA. Improper use implies many aspects, but here we imply the misuse of the parameters of RSA. Specially, sizes of parameters give strong effects on the efficiency and the security of the system. Parameters are also related each other. We analyze the relation of them. Recently many researchers are interested in side-channel attacks. We also investigate partial key exposure attacks, which was motivated by side-channel attacks. If a fraction of tile secret key bits is revealed, the private key will be reconstructed. We also study mathematical background of these attacks, solving modular multivariate polynomial equations.

  • PDF