• 제목/요약/키워드: privacy issues

검색결과 425건 처리시간 0.022초

u-Health IT 서비스 환경에서의 개인의료정보보호 수준제고 방안 (Issues on Privacy and Security of Health Information in u-Health IT Service Environment)

  • 김동수;김민수
    • 한국IT서비스학회:학술대회논문집
    • /
    • 한국IT서비스학회 2006년도 춘계학술대회
    • /
    • pp.282-289
    • /
    • 2006
  • 의료기관의 정보화 수준이 높아짐에 따라 권한 없는 자의 정보 접근 및 유출, 진료정보 및 개인정보의 손실이나 파손, 환자 안전에 대한 위협 등 여러 가지 정보보호 리스크 요인이 대두되고 있다. 의료기관이 취급하고 있는 의료정보는 환자 개인을 식별할 수 있는 개인정보뿐만 아니라 개인의 사생활보호 차원에서 신중하게 취급해야 하는 매우 민감한 진료 정보를 포함하고 있으므로 정보보호의 중요성이 매우 크다고 볼 수 있다. 따라서 개인의료정보를 컴퓨터와 네트워크를 통해 처리하는 의료기관의 정보보호 수준 제고가 매우 중요하고 시급한 과제로 인식되고 있다. 본 연구에서는 의료기관 정보화의 진전과 원격의료/재택의료의 발전, 국가보건의료정보 인프라 구축, e-Health 및 유비쿼터스 건강관리 시대의 도래 등과 같은 중대한 의료정보 패러다임의 변화 속에서 정보보호의 이슈와 해결방안을 모색해 보았으며, 의료정보보호 수준제고를 위한 정책방향을 제시하였다. 개별 의료기관뿐만 아니라 국가 차원의 의료정보 인프라 구축 사업 추진 시에도 본 연구에서 제안한 의료정보 보호 수준제고 방안이 적용되어 정보화의 효율성과 정보보호가 균형을 이룰 수 있을 것으로 기대된다.

  • PDF

Biometrics-based Key Generation Research: Accomplishments and Challenges

  • Ha, Lam Tran;Choi, Deokjai
    • 스마트미디어저널
    • /
    • 제6권2호
    • /
    • pp.15-25
    • /
    • 2017
  • The security and privacy issues derived from unsecurely storing biometrics templates in biometric authentication/ recognition systems have opened a new research area about how to secure the stored biometric templates. Biometrics-based key generation is the newest approach that provides not only a mechanism to protect stored biometric templates in authentication/ recognition systems, but also a method to integrate biometric systems with cryptosystems. Therefore, this approach has attracted much attention from researchers worldwide. A review of current research state to summarize the achievements and remaining works is necessary for further works. In this study, we first outlined the requirements and the primary challenges when implementing these systems. We then summarize the proposed techniques and achievements in representative studies on biometrics-based key generation. From that, we give a discussion about the accomplishments and remaining works with the corresponding challenges in order to provide a direction for further researches in this area.

DPI 기술 적용에 따른 사용자 개인정보 문제 해결방안 (The Solution of User Privacy Issues in DPI technology)

  • 오지수;이승현;박민우;정태명
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2012년도 추계학술발표대회
    • /
    • pp.1060-1063
    • /
    • 2012
  • 기존의 네트워크 관문에서 트래픽을 검사하는 장치들은 Application 계층의 데이터를 검사할 수 없어 보안에 한계가 있다. 이를 보완하기 위해 Application 계층까지 패킷을 분석할 수 있는 Deep Packet Inspection (DPI)기술이 개발되어 보안 강화에 사용되고 있다. 하지만 기업에서 DPI 기술을 이용하여 고객의 개인정보를 무단으로 수집 및 이용하면서 DPI 기술에 따른 개인정보 침해가 우려된다, 본 논문에서는 DPI 기술을 통한 사용자 정보 수집 시 개별 사용자의 동의를 받을 수 있는 방안을 제안하며, 이를 통해 DPI 기술에 따른 사용자 개인정보 문제를 해결하고자 한다.

TRT Pose를 이용한 모바일 로봇의 사람 추종 기법 (Development of Human Following Method of Mobile Robot Using TRT Pose)

  • 최준현;주경진;윤상석;김종욱
    • 대한임베디드공학회논문지
    • /
    • 제15권6호
    • /
    • pp.281-287
    • /
    • 2020
  • In this paper, we propose a method for estimating a walking direction by which a mobile robots follows a person using TRT (Tensor RT) pose, which is motion recognition based on deep learning. Mobile robots can measure individual movements by recognizing key points on the person's pelvis and determine the direction in which the person tries to move. Using these information and the distance between robot and human, the mobile robot can follow the person stably keeping a safe distance from people. The TRT Pose only extracts key point information to prevent privacy issues while a camera in the mobile robot records video. To validate the proposed technology, experiment is carried out successfully where human walks away or toward the mobile robot in zigzag form and the robot continuously follows human with prescribed distance.

Survey on Security in Wireless Sensor

  • Li, Zhijun;Gong, Guang
    • 정보보호학회논문지
    • /
    • 제18권6B호
    • /
    • pp.233-248
    • /
    • 2008
  • Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). There are numerous applications for wireless sensor networks, and security is vital for many of them. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the lack of infrastructure, all of which impose unique security challenges and make innovative approaches desirable. In this paper, we present a survey on security issues in wireless sensor networks. We address several network models for security protocols in WSNs, and explore the state of the art in research on the key distribution and management schemes, typical attacks and corresponding countermeasures, entity and message authentication protocols, security data aggregation, and privacy. In addition, we discuss some directions of future work.

The Current State of Cyber-Readiness of Saudi Arabia

  • Alhalafi, Nawaf;Veeraraghavan, Prakash
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.256-274
    • /
    • 2022
  • The continuous information technology and telecommunication (ICT) developments inspire several Saudi Arabia citizens to transact and interact online. However, when using online platforms, several people are likely to lose their personal information to cybercriminals. In the survey, 553 Saudi Arabia citizens and 103 information technology (IT) specialists confirm the expansion of digital economy and the need for smart cities with various services, including e-commerce and solid cyber security. 96.6% of the participants believe Saudi Arabia is digitalizing its economy; yet, 33.3% of the participants believe that residents are uninformed about living and operating in smart cities. Several people (47.29%) with medium internet speed are more aware about smart cities than those with fastest internet speed (34%). Besides, online transactions via credit cards subjected 55.5% of the participants to privacy and security issues. These findings validate the essence of cyber security awareness programs among Saudi Arabia citizens and IT professionals to boost public trust and acceptance of cybersecurity frameworks.

Review of Biometrics-Based Authentication Techniques in Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.321-327
    • /
    • 2021
  • Mobile devices have recently developed to be an integral part of humans' daily lives because they meet business and personal needs. It is challenging to design a feasible and effective user authentication method for mobile devices because security issues and data privacy threats have significantly increased. Biometric approaches are more effective than traditional authentication methods. Therefore, this paper aims to analyze the existing biometric user authentication methods on mobile platforms, particularly those that use face recognition, to demonstrate the methods' feasibility and challenges. Next, this paper evaluates the methods according to seven characteristics: universality, uniqueness, permanence, collectability, performance, acceptability, and circumvention. Last, this paper suggests that solely using the method of biometric authentication is not enough to identify whether users are authentic based on biometric traits.

Review on Software-Defined Vehicular Networks (SDVN)

  • Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.376-388
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular networks and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software-defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and a number of architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Software-Defined Vehicular Networks (SDVN)

  • Al-Mekhlafi, Zeyad Ghaleb
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.231-243
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular net- works and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and several architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.