• Title/Summary/Keyword: disclosure

Search Result 1,002, Processing Time 0.028 seconds

An Efficient-keyword-searching Technique over Encrypted data on Smartphone Database (스마트폰 데이터베이스 환경에서 암호화된 데이터에 대한 효율적인 키워드검색 기법)

  • Kim, Jong-Seok;Choi, Won-Suk;Park, Jin-Hyung;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.739-751
    • /
    • 2014
  • We are using our smartphone for our business as well as ours lives. Thus, user's privacy data and a company secret are stored at smartphone. By the way, the saved data on smartphone database can be exposed to a malicous attacker when a malicous app is installed in the smartphone or a user lose his/her smartphone because all data are stored as form of plaintext in the database. To prevent this disclosure of personal information, we need a database encryption method. However, if a database is encrypted, it causes of declining the performance. For example, when we search specific data in condition with encrypted database, we should decrypt all data stored in the database or search sequentially the data we want with accompanying overhead[1]. In this paper, we propose an efficient and searchable encryption method using variable length bloom filter under limited resource circumstances(e.g., a smartphone). We compare with existing searchable symmetric encryption. Also, we implemented the proposed method in android smartphone and evaluated the performance the proposed method. As a result through the implementation, We can confirm that our method has over a 50% improvement in the search speed compared to the simple search method about encrypted database and has over a 70% space saving compared to the method of fixed length bloom filter with the same false positive rate.

Hybrid Asymmetric Watermarking using Correlation and Critical Criteria (상관도와 임계치 방식을 이용한 다중검출 비대칭 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.726-734
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are the same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched by several researchers as a next generation watermarking technology. In this paper, hybrid asymmetric watermarking algorithm is proposed. This algorithm is composed of correlation detection method and critical criteria method. Each method can be individually used to detect watermark from a watermarked content. Hybrid asymmetric detection is complement between two methods, and more feasible than when each method is used respectively, Private key and public key are generated by secure linear transformation and specific matrix. As a result, we have proved the proposed algorithm is secured than symmetric watermarking algorithms. This algorithm can expand to multi bits embedding watermark system and is robust to JPEG and JPEG2000 compression.

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

Study on the Problems of Korean GAAP and Tax Regulations on the Merge Transactions ("기업인수.합병 등에 관한 회계처리준칙" 및 관련 세법 규정의 문제점)

  • Shin, Hyun-Geol
    • Korean Business Review
    • /
    • v.17 no.2
    • /
    • pp.1-23
    • /
    • 2004
  • Since revision of Korean GAAP on the merge transaction in 1999, the few studies on the problems of the GAAP or on the inconsistency of GAAP and regarding tax regulations have been performed. The objective of this study is to understand the present state of the merge transactions, to find out the problems on the regarding GAAP and tax regulations, and to suggest the method to improve them. Among the 69 merge transactions of the listed and registered companies for the recent 3 years, 67 merge transactions are reported as the purchase transactions and 2 transactions as the pooling of interest. And 11 transactions occurred between parents and subsidiaries. I investigate the sufficiency of the foot disclosures on the merge transactions, I find out that the disclosure on the amortization of the negative goodwill are not sufficient, and several transactions are not recorded in conformity with GAAP. This paper indicates the problems on the GAAP as follows: the complicated and irrational method of amortization of the negative goodwill, the valuation of the stocks acquired before the merge, the inconsistent adjustments to purchase consideration contingent on future events, and the valuation of the merge between the parents and subsidiaries. And the problems on the tax regulations are as follows: tax deferment of the income from merge valuation, the ambiguous definitions of the fair value, and stock dividend of the income from merge valuation.

  • PDF

The Revision Trend of UNCITRAL Model Law on International Commercial Arbitration (국제상사중재에 관한 UNCITRAL 모델법의 개정동향)

  • Lee, Kang-Bin
    • Journal of Arbitration Studies
    • /
    • v.16 no.3
    • /
    • pp.53-89
    • /
    • 2006
  • At its thirty-second session(Vienna, 17 May-4 June 1999), the UNCITRAL decided that the priority items for the Working Group(Arbitration and Conciliation) should include enforceability of interim measures and the requirement of written (on for the arbitration agreement. The Working Group, at its forty-third session(Vienna, 3-7 October 2005), it had undertaken a detailed review of the text of the revised article 17 of UNCTTRAL Model Law on International Commercial Arbitration, and it had resumed discussions on a draft model legislative provision revising article 7, paragraph (2) of UNCITRAL Model Law. The purpose of this paper is to make research on the contents and issues of the draft legislative provisions on interim measures and preliminary orders, and on the form of arbitration agreement which the Working Group discussed and adopted at its forth-fourth session(New York, 23-27 January 2006). The draft legislative provisions on interim measures and preliminary orders are composed of the following provisions : Article 17-power of arbitral tribunal to order interim measures; article 17 bis-conditions for granting interim measures; article 17 ter-applications for preliminary orders and conditions for granting preliminary orders; article 17 quater-specific regime for preliminary orders; article 17 quinquies- modification, suspension, termination; article 17 sexies-provision of security; article 17 septies-disclosure; article 17 octies-costs and damages; article 17 novies recognition and enforcements; article 17 decies-grounds for refusing recognition or enforcement; article 17 undecies-court-ordered interim measures. There are the following issues in the draft legislative provisions on interim measures and preliminary orders : form of issuance of an interim measures in article 17(2); conditions for granting interim measures in article 17 bis; purpose, function and legal regime of preliminary orders in article 17 ter; obligation of arbitral tribunal to give notice, and non-enforceability of preliminary orders in article 17 quater; burden of proof, interplay between article 17 decies and article 34, and decision on the recognition and enforcement of the interim measures in article 17 decies; placement of article 17 undecies; amendment of scope exception of application in article 1(2). The draft legislative provisions on the form of arbitration agreement are composed of the following provisions : article 7(1) definition of arbitration agreement; article 7(2) arbitration agreement in writing; article 7(3) arbitration agreement if its terms(content) are (is) recorded in any form; article 7(4) arbitration agreement by an electronic communication; article 7(5) arbitration agreement in an exchange of statements of claim and defence; article 7(6) reference to any document containing an arbitration clause. There are the following issues in the draft legislative provisions on the form of arbitration agreement : arbitration agreement in writing in article 7(2); terms or contents of arbitration agreement in article 7(3); arbitration agreement by electronic communication in article 7(4); existence of arbitration agreement in article 7(5); reference to any document containing an arbitration clause in article 7(6); the alternative proposal on article 7; amendment to article 35(2).

  • PDF

A Study on the Research Performance and Efficiency of Convergence Research Projects sponsored by National Research Council of Science & Technology : A Comparative Study of Convergence Research and General Trust Projects Using DEA (국가과학기술연구회 융합연구사업의 연구성과 효율성에 관한 연구 : DEA를 활용한 융합연구 및 일반수탁사업의 비교분석을 중심으로)

  • Yuk, Hyounggab;Kang, Jaeyeol;Pae, Kibong;Kang, Daeseok
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.211-218
    • /
    • 2020
  • This study compared and analyzed the efficiency of the research results of the convergence research project operated by the National Science and Technology Research Council and the general research project carried out by the Government-funded research institute and proposed measures to enhance the efficiency of the operation and management of convergence research. Research data were collected from 21 government-funded research institutes through an information disclosure claim and DEA analysis was conducted for efficiency assessment. The SCI papers of convergence research showed high efficiency, and the patent registration and technology transfer sector showed high efficiency of general research projects. This indicates that convergence research projects for securing lead and original technologies are highly efficient, but their performance is low due to lack of participation by businesses in terms of the utilization of derived technologies, and more companies' participation and opportunities are needed for practical use of convergence research results. Through the analysis of efficiency of convergence research project performance, this study provided policy and guidance for R&D planning for rational investment of limited manpower and research costs. Further, future research on identifying efficiency is proposed depending on the type of technology subject to convergence research as a method for managing convergence research.

Development of T-commerce Processing Payment Module Using IC Credit Card(EMV) (IC신용카드(EMV)를 이용한 T-커머스 결제처리 모듈 개발)

  • Choi, Byoung-Kyu;Lee, Dong-Bok;Kim, Byung-Kon;Heu, Shin
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.51-60
    • /
    • 2012
  • IC(Integrated circuits)card, generally be named smard card, embedded MPU(Micro Processor Unit) of small-size, memory, EEPROM, Card Operating System(COS) and security algorithm. The IC card is used in almost all industry such as a finance(credit, bank, stock etc.), a traffic, a communication, a medical, a electronic passport, a membership management and etc. Recently, a application field of IC card is on the increase by method for payments of T-commerce, as T-commerce is becoming a new growth engine of the broadcating industry by trend of broadcasting and telecommunication convergence, smart mechanization of TV. For example, we can pay in IC credit card(or IC cash card) on T-Commerce. or we can be provided TV banking service in IC cash card such as ATM. However, so far, T-commerce payment services have weakness in security such as storage and disclosure of card information as well as dropping sharply about custom ease because of taking advantage of card information input method using remote control. To solve this problem, This paper developed processing payment module for implementing TV electronic payment system using IC credit card payment standard, EMV.

Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services (위치기반 서비스에서 효율적 검색과 사용자 정보보호를 위한 향상된 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-Hye;Song, Doo-Hee;Cai, Tian-Yuan;Park, Kwang-Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.8
    • /
    • pp.195-202
    • /
    • 2018
  • With the development of location-based applications such as smart phones and GPS navigation, active research is being conducted to protect location and trajectory privacy. To receive location-related services, users must disclose their exact location to the server. However, disclosure of users' location exposes not only their locations but also their trajectory to the server, which can lead to concerns of privacy violation. Furthermore, users request from the server not only location information but also multimedia information (photographs, reviews, etc. of the location), and this increases the processing cost of the server and the information to be received by the user. To solve these problems, this study proposes the EGTC (Enhanced Grid-based Trajectory Cloaking) technique. As with the existing GTC (Grid-based Trajectory Cloaking) technique, EGTC method divides the user trajectory into grids at the user privacy level (UPL) and creates a cloaking region in which a random query sequence is determined. In the next step, the necessary information is received as index by considering the sub-grid cell corresponding to the path through which the user wishes to move as c(x,y). The proposed method ensures the trajectory privacy as with the existing GTC method while reducing the amount of information the user must listen to. The excellence of the proposed method has been proven through experimental results.

Probability-based Cost Analysis for Recycling Secondary Products from Construction Waste (건설폐기물 재활용 2차 제품에 대한 확률모델 기반 비용분석)

  • Kwon, Kihyon;Kim, Do-Gyeum;Lee, Ho-Jae;Seo, Eun-Ah
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.8 no.2
    • /
    • pp.227-234
    • /
    • 2020
  • Under consideration of construction waste recycling, candidate secondary products applicable for the civil and construction areas can be reliably employed based on the recycling cost analysis. For the validation purpose, probability-based cost analyses were performed to estimate recycling cost profit considering uncertainties. When recycling construction wastes, the costs at each stage are fully dependent on target products to be adopted. To achieve commercialization of each product, its quality has to be improved with economic efficiency through accurate evaluation of input costs. Based on the probabilistic recycling cost analysis, the cost benefit for target products was estimated with waste classification cost, transportation cost to recycling treatment facilities and production cost. All necessary information on the cost analysis were collected from literature, disclosure, and existing recycling companies. In addition, a cost difference between recycled and non-recycled events was made. As a result, a probability-based recycling cost estimate for candidate secondary products was herein presented.

Development of a Prototype Patient Monitoring System with Module-Based Bedside Units and Central Stations: Overall Architecture and Specifications (모듈형 환자감시기와 중앙 환자감시기로 구성되는 환자감시시스템 시제품의 개발: 전체구조 및 사양)

  • Woo, E.J.;Park, S.H.;Jun, B.M.;Moon, C.W.;Lee, H.C.;Kim, S.T.;Kim, H.J.;Seo, J.J.;Chae, K.M.;Park, J.C.;Choi, K.H.;Lee, W.J.;Kim, K.S.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1996 no.05
    • /
    • pp.315-319
    • /
    • 1996
  • We have developed a prototype patient monitoring system including module-based bedside units, interbed network, and central stations. A bedside unit consists of a color monitor and a main CPU unit with peripherals including a module controller. It can also include up to 3 module cases and 21 different modules. In addition to the 3-channel recorder module, six different physiological parameters of ECG, respiration, invasive blood pressure, noninvasive blood pressure, body temperature, and arterial pulse oximetry with plethysmogaph are provided as parameter modules. Modules and a module controller communicate with up to 1Mbps data rate through an intrabed network based on RS-485 and HDLC protocol. Bedside units can display up to 12 channels of waveforms with any related numeric informations simultaneously. At the same time, it communicates with other bedside units and central stations through interbed network based on 10Mbps Ethernet and TCP/IP protocol. Software far bedside units and central stations fully utilizes gaphical user interface techniques and all functions are controlled by a rotate/push button on bedside unit and a mouse on central station. The entire system satisfies the requirements of AAMI and ANSI standards in terms of electrical safety and performances. In order to accommodate more advanced data management capabilities such as 24-hour full disclosure, we are developing a relational database server dedicated to the patient monitoring system. We are also developing a clinical workstation with which physicians can review and examine the data from patients through various kinds of computer networks far diagnosis and report generation. Portable bedside units with LCD display and wired or wireless data communication capability will be developed in the near future. New parameter modules including cardiac output, capnograph, and other gas analysis functions will be added.

  • PDF