• 제목/요약/키워드: privacy issues

검색결과 416건 처리시간 0.018초

A Study on Privacy Issues and Solutions of Public Data in Education

  • Jun, Woochun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권1호
    • /
    • pp.137-143
    • /
    • 2020
  • With the development of information and communication technology, various data have appeared and are being distributed. The use of various data has contributed to the enrichment and convenience of our lives. Data in the public areas is also growing in volume and being actively used. Public data in the field of education are also used in various ways. As the distribution and use of public data has increased, advantages and disadvantages have started to emerge. Among the various disadvantages, the privacy problem is a representative one. In this study, we deal with the privacy issues of public data in education. First, we introduce the privacy issues of public data in the education field and suggest various solutions. The various solutions include the expansion of privacy education opportunities, the need for a new privacy protection model, the provision of a training opportunity for privacy protection for teachers and administrators, and the development of a real-time privacy infringement diagnosis tool.

RFID 프라이버시 보호 프레임웍 및 프로세스 설계에 관한 연구 (A Framework and Process Design for RFID Privacy Protection)

  • 김진수
    • Journal of Information Technology Applications and Management
    • /
    • 제14권3호
    • /
    • pp.151-168
    • /
    • 2007
  • RFID is an emerging technology and rapidly applied to various industries due to its high-tech characteristic and convenience. Although RFID provides valuable benefits. it might also generate serious privacy problems. Previous studies show that privacy issues should be incorporated in developing RFID systems and more detailed privacy protection methods. However. they just provide basic concept, rough guideline. and simple architecture about RFID privacy protection. Industry needs more structured framework and detailed systematic process to incorporate privacy issues into the RFID system. The purpose of this paper is to develop a framework and detailed process design of RFID privacy protection issues in retail industries. A framework is developed based on individual sensitivity concept, RFID contents, and interface with EPC global standard. Case study is applied to validate the framework and it turns out to be useful. It is expected that the proposed framework and process design would provide more systematic guide lines to solving RFID privacy problems.

  • PDF

Analyses of Security, Privacy Issues and Challenges for RFID System

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제9권6호
    • /
    • pp.701-705
    • /
    • 2011
  • RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by researcher in order to protect against some malicious attacks and threat. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyses security schemes and vulnerability in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. Neither a symmetric nor an asymmetric cryptographic deployment is necessarily used with light weighted algorithm in the future.

A Study on the Users' Response to Privacy Issues in Customized Services

  • Park, Sunwoo;Baek, Jeongyun;Yoo, Yeajoo;Kim, Dongwhan
    • Journal of Multimedia Information System
    • /
    • 제9권3호
    • /
    • pp.201-208
    • /
    • 2022
  • Customized service is a vital and mandatory element for apps in improving their technical performance and app customer analysis. While apps require users' consent for their data extraction and usage, many of the terms and agreement forms are written intricately, making it harder for users to fully understand the whole concept of users' data collection for customized services. Ever since the Facebook-Cambridge Analytica scandal, personal data privacy has been re-examined, forcing many app companies to reinforce a reliable solution to data privacy issues. However, there has not been a secured solution, which worries many people about the future advanced issues when metaverse platforms are actively used in daily apps. The research aims to collect the reactions and behaviors of everyday app users who utilize apps with customized services to understand the nature of privacy data issues and the users' opinions about the future implementation of metaverse platforms. The method of the research was an online questionnaire that targeted university students. The study revealed many fearful and anxious reactions about personal data and further metaverse issues where most app users were uneducated about how current apps collect and utilize users' private data.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.24-45
    • /
    • 2012
  • In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.

아동 이용자에게 특화된 온라인 개인정보보호 이슈 : 사례연구를 중심으로 (Protecting Children's Online Privacy : Privacy Issues and Its Implications)

  • 나종연;조은선;이승은
    • 디지털융복합연구
    • /
    • 제18권10호
    • /
    • pp.23-31
    • /
    • 2020
  • 최근 아동들의 온라인 활동에 대한 참여가 활발해짐에 따라 아동을 대상으로 하는 온라인 서비스 역시 빠르게 증가하고 있음에도 불구하고, 아동들은 그들의 보호받아 마땅한 권리를 충분히 보장받고 있지 못하다. 본 연구는 아동이 주로 이용하는 앱서비스를 대상으로 현황 및 사례 조사를 통해 국내 아동 개인정보보호에 관련한 이슈를 유형화하여 분석하는 것을 목적으로 한다. 이를 위해 아동의 개인정보보호에 관한 현황을 살펴보고 국내외 법제도에 근거하여 이슈를 도출했다. 연구 결과, 아동 식별의 이슈, 고지 및 동의의 실효성 이슈, 정보주체로서 아동의 권익 이슈 등이 도출되었다. 현황분석을 통해 살펴본 온라인 환경에서의 아동 개인정보 관련 내용을 바탕으로 정책적 시사점을 도출하고 개선방안 등을 제언하였다.

A Framework for measuring query privacy in Location-based Service

  • Zhang, Xuejun;Gui, Xiaolin;Tian, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1717-1732
    • /
    • 2015
  • The widespread use of location-based services (LBSs), which allows untrusted service provider to collect large number of user request records, leads to serious privacy concerns. In response to these issues, a number of LBS privacy protection mechanisms (LPPMs) have been recently proposed. However, the evaluation of these LPPMs usually disregards the background knowledge that the adversary may possess about users' contextual information, which runs the risk of wrongly evaluating users' query privacy. In this paper, we address these issues by proposing a generic formal quantification framework,which comprehensively contemplate the various elements that influence the query privacy of users and explicitly states the knowledge that an adversary might have in the context of query privacy. Moreover, a way to model the adversary's attack on query privacy is proposed, which allows us to show the insufficiency of the existing query privacy metrics, e.g., k-anonymity. Thus we propose two new metrics: entropy anonymity and mutual information anonymity. Lastly, we run a set of experiments on datasets generated by network based generator of moving objects proposed by Thomas Brinkhoff. The results show the effectiveness and efficient of our framework to measure the LPPM.

지능형 차량 이동네트워크 환경에서 차량과 통신설비간의 효율적인 인증프로토콜 (An Efficient Authentication Protocol between Vehicle and Communication Infrastructure for Intelligent Vehicular Networks)

  • 황병희;김범한;이동훈
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.500-503
    • /
    • 2008
  • Vehicular Ad hoc Networks have attracted extensive attentions in recent years for their promises in improving safety and enabling other value-added services. Security and privacy are two integrated issues in the deployment of vehicular networks. Privacy-preserving authentication is a key technique in addressing these two issues. We propose a hash chain based authentication protocol that preserves the user privacy. We show that the our scheme can efficiently authenticate users. Name of Our protocol is

  • PDF

Quantizing Personal Privacy in Ubiquitous Computing

  • Ma, Tinghuai;Tian, Wei;Guan, Donghai;Lee, Sung-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권9호
    • /
    • pp.1653-1667
    • /
    • 2011
  • Privacy is one of the most important and difficult research issues in ubiquitous computing. It is qualitative rather than quantitative. Privacy preserving mainly relies on policy based rules of the system, and users cannot adjust their privacy disclosure rules dynamically based on their wishes. To make users understand and control their privacy measurement, we present a scheme to quantize the personal privacy. We aim to configure the person's privacy based on the numerical privacy level which can be dynamically adjusted. Instead of using the traditional simple rule engine, we implement this scheme in a complex way. In addition, we design the scenario to explain the implementation of our scheme. To the best of our knowledge, we are the first to assess personal privacy numerically to achieve precision privacy computing. The privacy measurement and disclosure model will be refined in the future work.