• 제목/요약/키워드: identity management models

검색결과 23건 처리시간 0.023초

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

인터넷 신원 관리 2.0에 대한 분석과 3.0에 대한 전망 (Analysis of Internet Identity Management 2.0 and Perspective of 3.0)

  • 박승철
    • 한국정보통신학회논문지
    • /
    • 제15권7호
    • /
    • pp.1501-1509
    • /
    • 2011
  • 재 인터넷의 서비스 제공자 중심적(service provider-centric)이고 고립형(isolated)의 선원 관리 1.0 모델(identity management 1.0 model)은 사용자 편의성 부족, 고비용 구조, 프라이버시 보호 어려움, 그리고 신뢰 인프라 부재 등의 여러 가지 문제를 안고 있다. 이러한 문제를 개선하기 위해 Passport/Live ID, Liberty Alliance/SAML(Security Assertion Markup Language), CardSpace, OpenID 등 SSO(Single Sign On) 서비스에 기초한 다양한 선원 관리 2.0 모델들이 개발되어 왔으나 실제 인터넷 환경에서 아직까지 신원 관리 1.0 모델을 대체할 수 있을 정도로 광범위하게 수용되지 못하고 있다. 본 논문은 현재 개발되고 있는 대표적인 신원관리 2.0 모델들을 비교분석하고, 분석 결과를 바탕으로 미래 인터넷을 위한 신원 관리 3.0 모델의 개발 방향을 제시하고자 한다.

인터넷 Identity 관리 시스템을 위한 프라이버시 인가 (Privacy Authorization for Internet Identity Management System)

  • 노종혁;진승헌;이균하
    • 한국통신학회논문지
    • /
    • 제30권10B호
    • /
    • pp.648-659
    • /
    • 2005
  • 인터넷에 산재되어 있는 사용자 개인정보의 오남용은 더 이상 간과할 수 없는 문제이다. 개인정보의 유통은 반드시 소유자의 허가 하에서만 이루어져야 하고, 개인정보를 관리하는 사이트는 인터넷에 익숙하지 않은 사용자들에게 개인정보 유출에 관한 두려움을 없애줄 수 있는 환경을 제공하여야 한다. 본 논문은 인터넷 Identity 관리시스템에서 개인정보를 안전하게 관리하고 유통할 수 있는 기술을 소개한다. 개인정보의 소유자가 자신의 정보를 관리하는 방법, 정보 관리 시스템 차원에서 사용자 정보를 관리하기 위한 정책, 개인정보 접근을 제어하는 Privacy Controller 등 여러 관점에서의 프라이버시 인가 기술을 제안한다. 그리고, 정책 기반의 프라이버시 인가 기술을 인터넷 Identity 관리 시스템에 적용하기 위한 다양한 모델을 제시한다.

인터넷 환경에서의 사용자 중심 ID정보 관리 모델에 관한 연구 (A Study On User-centric Identity Information Management Model In Internet Environment)

  • 이해규;신현식
    • 정보보호학회논문지
    • /
    • 제19권3호
    • /
    • pp.37-50
    • /
    • 2009
  • 인터넷의 발전으로 사용자들이 이용하는 인터넷 서비스들의 수가 많아지면서 서비스 제공자들이 수집하는 사용자의 실체(Identity)에 관한 개인정보, 즉 ID정보의 적절한 관리는 사용자의 편리성 증대와 프라이버시 보호 측면에서 매우 중요하게 되었다. 그러나 기존의 ID정보 관리 모델들은 서비스 제공자 중심의 관리이거나 제공하는 ID정보 관리 기능이 부족하여 사용자의 기대를 만족시키지 못했다. 본 논문에서는 ID정보 관리에서의 사용자 중심 개념을 정립하여, 사용자들의 인터넷 서비스 이용이 더욱 편리해지고, 궁극적으로 프라이버시가 강화될 수 있는 새로운 사용자 중심 ID정보 관리 모델을 제안한다.

Effects on Consumers' Behavior through Psychological Brand Community of Well-Being Consumers

  • LEE, Jae-Min;KIM, Kyong-Hwan
    • 웰빙융합연구
    • /
    • 제4권2호
    • /
    • pp.14-18
    • /
    • 2021
  • Purpose: The purpose of this study was to identify the factors that enhance brand identity among the four relationship factors in the well-being industry: brand relationships, product relationships, employee relationships, and other customer relationships, and to examine the impact between consumers' brand identity and committed behaviors performed by consumers of brand equality, promotion, cooperation, and advocacy. Research design, data and methodology: The models designed in this study were proposed based on prior studies and the survey was conducted on well-being consumers for empirical testing of the models. Valid samples of a total of 350 data collected were analyzed using the SAS 9.4 statistical package programs, and the results for the structural equation model analysis are as follows. Results: First, the three relationships in the brand community have all been shown to improve brand identity, but the product relationship has had a negative significant effect. Second, consumers' brand identity has had a strong effect of promoting both committed behavior, cooperation and advocacy. Conclusions: Based on these analysis results, the theoretical implications of the well-being industry were presented, and effective practical implications were presented to the well-being operators and the community operators of well-being brands.

Self-Sovereign Identity (SSI: 자기주권신원) 연구 동향 분석: 사회경제, 법률, 기술적 고찰을 중심으로 (Self-Sovereign Identity (SSI): Structured Literature Reviews with Socio-Technical Perspective)

  • 손영진;박민정;박정숙;황화정;채상미
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제30권4호
    • /
    • pp.119-152
    • /
    • 2021
  • The concept of Self-Sovereign Identity (SSI) has emerged to overcome the limitations of traditional centralized personal identity management systems in our society. Therefore, in this study, 36 seminal researches out of 112 collected studies were investigated with a systematic literature review method to deliver a core common definition as well as the research trends on SSI in the socioeconomic, legal and technological fields. SSI studies in the legal field have mainly considered the conflicts with relevant laws such as General Data Protection Regulation (GDPR) and privacy protection laws. The study of SSI in the technology field have looked at the trends of the technical components to implement SSI and discussed the necessities of establishing standards to increase interoperability for SSI diffusion worldwide. This study ultimately derived the core definition of SSI from a various academic fields as "a trust-based personal identity management system that enables autonomous self-identification by a identity owner without a centralized system or 3rd party intervention". The results of this study contribute to the understanding of the essential SSI concept which were varied on different research fields and industries. The results also provide a foundation for discovering various SSI-based business models, applications as well as future research opportunities. Furthermore, this study suggested that SSI must be developed with interdisciplinary manner among the socioeconomic, legal, and technological fields to be practically applicable system to enable autonomous self-identification by a identity owner in our society.

헬스케어시스템을 위한 역할 기반의 신뢰협상 모델

  • 조현숙;이형
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2007년도 춘계학술대회
    • /
    • pp.84-102
    • /
    • 2007
  • Security is crucial for the successful deployment of large distributed systems. Many of these systems provide services to people across different administrative domains. The traditional identity-based access control mechanisms are un scalable and difficult to manage. Unlike the closed systems, open systems provide services to people from different security domains. Healthcare systems need to be highly available in order for the patients to get a timely treatment. The health care information should be available to authorized users both inside the administrative domain and outside the domain, such as pharmacies and insurance companies. In this paper, we first analyzed the necessities and advantages of importing attribute-based trust-management models into open distributed systems. Then we reviewed traditional access-control models and presented the basic elements of the new trust-management model.

  • PDF

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

청소년들의 성 정체성에 관한 지식검색 커뮤니티 정보탐색행태 (Adolescents' Information-seeking Behavior for Gender Identity in a Community-driven Knowledge Site)

  • 이다정;이용정
    • 정보관리학회지
    • /
    • 제36권4호
    • /
    • pp.161-181
    • /
    • 2019
  • 사람들은 청소년기에 성적 지향이나 성 정체성에 대해 인식하기 시작하며, 청소년들은 성에 관한 민감한 건강정보 탐색을 위해 접근이 편하고 익명성이 보장된 지식검색 커뮤니티를 자주 이용한다. 본 연구는 지식검색 커뮤니티에 나타난 청소년들의 성 정체성에 관련된 질문과 답변을 바탕으로 그들의 정보탐색 행태를 관찰하고자 하였다. 먼저, 그들의 정보 요구를 파악하고 그들이 공유한 질문에 제공된 답변들 가운데 채택된 답변과 비 채택된 답변의 특성을 비교하여 청소년들이 어떠한 답변을 선호하는지 조사하였다. 이를 위해 국내의 대표적인 지식검색 커뮤니티인 네이버 지식iN에서 2016년 1월부터 2018년 12월까지 3년간 채택된 답변과 비 채택된 답변으로 구성된 총 358세트의 데이터를 분석하였다. 분석 결과, 성 정체성에 관한 고민을 가진 청소년들은 성 정체성에 대한 정의나 혼란에 관한 정보 요구가 많았다. 이용자들이 채택한 답변에는 공감 및 긍정적인 느낌을 주는 요인들이 채택되지 않은 답변에 비해 많았으며, 반면에 채택되지 않은 답변에는 부정적인 요인들이 높게 나타났다. 본 연구는 성 정체성이 확립되지 않은 청소년들이 가진 정보 요구와 정보탐색 행태를 분석하여 정보탐색 분야의 논의를 확장하고 건강정보 이용자의 정보 평가에 이용되는 인지적 및 감정적 모델을 검증했다는 데 학문적 의의가 있다. 또한 연구 결과를 바탕으로 소셜 미디어가 청소년에게 제공해야 할 성 정체성에 관한 효과적인 정보서비스에 대한 실질적인 함의를 제안한다.

Developing Optimal Demand Forecasting Models for a Very Short Shelf-Life Item: A Case of Perishable Products in Online's Retail Business

  • Wiwat Premrudikul;Songwut Ahmornahnukul;Akkaranan Pongsathornwiwat
    • Journal of Information Technology Applications and Management
    • /
    • 제30권3호
    • /
    • pp.1-13
    • /
    • 2023
  • Demand forecasting is a crucial task for an online retail where has to manage daily fresh foods effectively. Failing in forecasting results loss of profitability because of incompetent inventory management. This study investigated the optimal performance of different forecasting models for a very short shelf-life product. Demand data of 13 perishable items with aging of 210 days were used for analysis. Our comparison results of four methods: Trivial Identity, Seasonal Naïve, Feed-Forward and Autoregressive Recurrent Neural Networks (DeepAR) reveals that DeepAR outperforms with the lowest MAPE. This study also suggests the managerial implications by employing coefficient of variation (CV) as demand variation indicators. Three classes: Low, Medium and High variation are introduced for classify 13 products into groups. Our analysis found that DeepAR is suitable for medium and high variations, while the low group can use any methods. With this approach, the case can gain benefit of better fill-rate performance.