• 제목/요약/키워드: privacy issues

검색결과 425건 처리시간 0.026초

태양 에너지 수집형 IoT 엣지 컴퓨팅 환경에서 효율적인 오디오 딥러닝을 위한 에너지 적응형 데이터 전처리 기법 (Energy-Aware Data-Preprocessing Scheme for Efficient Audio Deep Learning in Solar-Powered IoT Edge Computing Environments)

  • 유연태;노동건
    • 대한임베디드공학회논문지
    • /
    • 제18권4호
    • /
    • pp.159-164
    • /
    • 2023
  • Solar energy harvesting IoT devices prioritize maximizing the utilization of collected energy due to the periodic recharging nature of solar energy, rather than minimizing energy consumption. Meanwhile, research on edge AI, which performs machine learning near the data source instead of the cloud, is actively conducted for reasons such as data confidentiality and privacy, response time, and cost. One such research area involves performing various audio AI applications using audio data collected from multiple IoT devices in an IoT edge computing environment. However, in most studies, IoT devices only perform sensing data transmission to the edge server, and all processes, including data preprocessing, are performed on the edge server. In this case, it not only leads to overload issues on the edge server but also causes network congestion by transmitting unnecessary data for learning. On the other way, if data preprocessing is delegated to each IoT device to address this issue, it leads to another problem of increased blackout time due to energy shortages in the devices. In this paper, we aim to alleviate the problem of increased blackout time in devices while mitigating issues in server-centric edge AI environments by determining where the data preprocessed based on the energy state of each IoT device. In the proposed method, IoT devices only perform the preprocessing process, which includes sound discrimination and noise removal, and transmit to the server if there is more energy available than the energy threshold required for the basic operation of the device.

사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석 (Analyses of Requirement of Security based on Gateway Architecture for Secure Internet)

  • 김정태
    • 예술인문사회 융합 멀티미디어 논문지
    • /
    • 제6권3호
    • /
    • pp.461-470
    • /
    • 2016
  • 최근 차세대 성장 동력으로 사물인터넷망이 각광받고 있다. 이러한 사물인터넷망의의 특징은 모든 사물들이 상호 연결되는 초연결성을 이루고 있으며, 센서 노드에서의 제한된 연산 능력, 메모리, 배터리 등에 기인하여 많은 한계점을 가진다. 이러한 문제 등으로 인하여 보안 및 프라이버시 문제가 대두되고 있다. 또한 많은 연구자들이 사물인터넷망에서의 보안적인 문제 및 공개된 문제점을 연구하고 있으나, 현재 까지 보안 관점에서 명쾌한 문제점을 해결하기 위한 접근을 보이고 있지 않다. 따라서 이러한 문제점을 해결하기 위한 IoT 의 구조, 프로토콜, 서비스 및 응용 분야에 대한 문제점을 해결하고 있다. 따라서 본 논문에서는 이러한 보안 문제를 해결하기 위해 요구되어지는 보안 사항 및 보안 프레임워크의 구조를 분석하고자 한다. 현실적으로 센서들이 안전하지 않을 지라도 이를 해결할 수 있는 대안이 IoT 게이트웨이를 통한 구현 방법이 한 대안이 되고 있다. 따라서 이러한 보안게이트를 통한 구조를 분석하고자 한다.

스마트 그리드 환경에서 블록체인 기반 스마트 미터 인증 프로토콜 (Blockchain-based Smart Meter Authentication Protocol in Smart Grid Environment)

  • 김종현;김명현;박영호
    • 한국산업정보학회논문지
    • /
    • 제28권5호
    • /
    • pp.41-54
    • /
    • 2023
  • 스마트 그리드는 효율적인 에너지 생산과 소비, 관리를 지원해주는 전력망 시스템으로 다양한 분야와 산업에서 활용되고 있다. 그러나 공개된 네트워크를 통해 서비스가 제공되는 환경에서는 보안 취약점과 개인정보 침해에 대한 신뢰 문제 해결은 필수적이다. 특히, 스마트 미터 단말의 식별정보는 중앙화된 서버를 통해 일괄적으로 관리되며, 중앙화된 관리 구조는 단말기 탈취, 데이터 위조 및 변조, 삭제 등 공격에 취약하다. 본 논문은 이러한 문제점을 해결하기 위해 탈중앙 분산원장 기술인 블록체인을 활용한 스마트 미터 인증 프로토콜을 제안한다. 제안된 방식은 블록체인을 통한 개별 스마트 미터 단말의 고유한 분산식별자(DID) 발급과 물리적복제방지기술(PUF)을 기반한 난수 값을 사용하여 데이터의 무결성과 신뢰성을 강화한다. 또한 비정형 보안 분석 및 AVISPA 시뮬레이션을 이용하여 제안한 방식의 안전성을 분석하고 관련 연구들과 비교하여 효율적인 방식임을 보인다.

보다 정확한 동적 상황인식 추천을 위해 정확 및 오류 패턴을 활용하여 순차적 매칭 성능이 개선된 상황 예측 방법 (Context Prediction Using Right and Wrong Patterns to Improve Sequential Matching Performance for More Accurate Dynamic Context-Aware Recommendation)

  • 권오병
    • Asia pacific journal of information systems
    • /
    • 제19권3호
    • /
    • pp.51-67
    • /
    • 2009
  • Developing an agile recommender system for nomadic users has been regarded as a promising application in mobile and ubiquitous settings. To increase the quality of personalized recommendation in terms of accuracy and elapsed time, estimating future context of the user in a correct way is highly crucial. Traditionally, time series analysis and Makovian process have been adopted for such forecasting. However, these methods are not adequate in predicting context data, only because most of context data are represented as nominal scale. To resolve these limitations, the alignment-prediction algorithm has been suggested for context prediction, especially for future context from the low-level context. Recently, an ontological approach has been proposed for guided context prediction without context history. However, due to variety of context information, acquiring sufficient context prediction knowledge a priori is not easy in most of service domains. Hence, the purpose of this paper is to propose a novel context prediction methodology, which does not require a priori knowledge, and to increase accuracy and decrease elapsed time for service response. To do so, we have newly developed pattern-based context prediction approach. First of ail, a set of individual rules is derived from each context attribute using context history. Then a pattern consisted of results from reasoning individual rules, is developed for pattern learning. If at least one context property matches, say R, then regard the pattern as right. If the pattern is new, add right pattern, set the value of mismatched properties = 0, freq = 1 and w(R, 1). Otherwise, increase the frequency of the matched right pattern by 1 and then set w(R,freq). After finishing training, if the frequency is greater than a threshold value, then save the right pattern in knowledge base. On the other hand, if at least one context property matches, say W, then regard the pattern as wrong. If the pattern is new, modify the result into wrong answer, add right pattern, and set frequency to 1 and w(W, 1). Or, increase the matched wrong pattern's frequency by 1 and then set w(W, freq). After finishing training, if the frequency value is greater than a threshold level, then save the wrong pattern on the knowledge basis. Then, context prediction is performed with combinatorial rules as follows: first, identify current context. Second, find matched patterns from right patterns. If there is no pattern matched, then find a matching pattern from wrong patterns. If a matching pattern is not found, then choose one context property whose predictability is higher than that of any other properties. To show the feasibility of the methodology proposed in this paper, we collected actual context history from the travelers who had visited the largest amusement park in Korea. As a result, 400 context records were collected in 2009. Then we randomly selected 70% of the records as training data. The rest were selected as testing data. To examine the performance of the methodology, prediction accuracy and elapsed time were chosen as measures. We compared the performance with case-based reasoning and voting methods. Through a simulation test, we conclude that our methodology is clearly better than CBR and voting methods in terms of accuracy and elapsed time. This shows that the methodology is relatively valid and scalable. As a second round of the experiment, we compared a full model to a partial model. A full model indicates that right and wrong patterns are used for reasoning the future context. On the other hand, a partial model means that the reasoning is performed only with right patterns, which is generally adopted in the legacy alignment-prediction method. It turned out that a full model is better than a partial model in terms of the accuracy while partial model is better when considering elapsed time. As a last experiment, we took into our consideration potential privacy problems that might arise among the users. To mediate such concern, we excluded such context properties as date of tour and user profiles such as gender and age. The outcome shows that preserving privacy is endurable. Contributions of this paper are as follows: First, academically, we have improved sequential matching methods to predict accuracy and service time by considering individual rules of each context property and learning from wrong patterns. Second, the proposed method is found to be quite effective for privacy preserving applications, which are frequently required by B2C context-aware services; the privacy preserving system applying the proposed method successfully can also decrease elapsed time. Hence, the method is very practical in establishing privacy preserving context-aware services. Our future research issues taking into account some limitations in this paper can be summarized as follows. First, user acceptance or usability will be tested with actual users in order to prove the value of the prototype system. Second, we will apply the proposed method to more general application domains as this paper focused on tourism in amusement park.

M2M 통신에서 원격장치 인증 기법 (A remote device authentication scheme in M2M communications)

  • 이송희;박남섭;이근호
    • 디지털융복합연구
    • /
    • 제11권2호
    • /
    • pp.309-316
    • /
    • 2013
  • 사물지능통신(Machine to Machine) 은 사람의 도움없이 언제, 어디서나 독립적으로 기기간 통신을 가능하게 한다. M2M통신은 보통 무선구간의 통신을 포함하므로 도청, 가로채기, 변조, 프라버시 침해 등의 보안문제가 많이 발생할 수 있다. 따라서 무엇보다 기기들간의 안전한 통신을 이루는 것이 가장 중요한 문제 중 하나이다. 본 논문에서는 M2M 아키텍쳐에서 M2M 도메인과 네트워크 도메인간에 인증을 통해 데이터 노출을 피하고 안전한 통신을 제공하기위해 동적 ID기반의 원격 인증 기법을 제안한다. 제안된 기법은 로직기반의 정형검증을 통해서 우수한 보안성과 안전성이 증명되었다.

Using Keystroke Dynamics for Implicit Authentication on Smartphone

  • Do, Son;Hoang, Thang;Luong, Chuyen;Choi, Seungchan;Lee, Dokyeong;Bang, Kihyun;Choi, Deokjai
    • 한국멀티미디어학회논문지
    • /
    • 제17권8호
    • /
    • pp.968-976
    • /
    • 2014
  • Authentication methods on smartphone are demanded to be implicit to users with minimum users' interaction. Existing authentication methods (e.g. PINs, passwords, visual patterns, etc.) are not effectively considering remembrance and privacy issues. Behavioral biometrics such as keystroke dynamics and gait biometrics can be acquired easily and implicitly by using integrated sensors on smartphone. We propose a biometric model involving keystroke dynamics for implicit authentication on smartphone. We first design a feature extraction method for keystroke dynamics. And then, we build a fusion model of keystroke dynamics and gait to improve the authentication performance of single behavioral biometric on smartphone. We operate the fusion at both feature extraction level and matching score level. Experiment using linear Support Vector Machines (SVM) classifier reveals that the best results are achieved with score fusion: a recognition rate approximately 97.86% under identification mode and an error rate approximately 1.11% under authentication mode.

'Viewpoints/ Concerns' on empirical methodologies for Socio/ cultural studies

  • Ashis, Jalote Parmar;Lee, Kun-Pyo
    • 한국디자인학회:학술대회논문집
    • /
    • 한국디자인학회 2004년도 추계 학술발표대회 논문집
    • /
    • pp.212-213
    • /
    • 2004
  • Since the advent of man there has been a constant struggle to define social pattern, and understand ways of cultural thinking. Every culture has it's own limitations and freedoms, problems and expectations. For centuries now anthropologist, ethnographers have worked on mapping and defining these differences. These findings instigate the designers to formulate new design theories and research methodologies for drafting cultural specific solutions. The question arises 'in a cross cultural application how effective and applicable are the basic research methodologies'? Quoting one such example the 'Privacy' issue seems to be a very strong component in the Japanese culture but is often a deterring factor in allowing the 'home ethnographic study to take place effectively'. However in countries like India similar studies could have a more welcoming reaction owing to the adaptive social culture. Similarly, the high rate of 'Illiteracy' in rural India closes many doors for 'form filling' user surveys. This leads to the scope of research for understanding specific cultural traits that may effect adaptation and re-improvisation of these existing methodologies. Quite often the cultural traits of a country may lead in forming new research methodologies.

  • PDF

Overview of personalized medicine in the disease genomic era

  • Hong, Kyung-Won;Oh, Berm-Seok
    • BMB Reports
    • /
    • 제43권10호
    • /
    • pp.643-648
    • /
    • 2010
  • Sir William Osler (1849-1919) recognized that "variability is the law of life, and as no two faces are the same, so no two bodies are alike, and no two individuals react alike and behave alike under the abnormal conditions we know as disease". Accordingly, the traditional methods of medicine are not always best for all patients. Over the last decade, the study of genomes and their derivatives (RNA, protein and metabolite) has rapidly advanced to the point that genomic research now serves as the basis for many medical decisions and public health initiatives. Genomic tools such as sequence variation, transcription and, more recently, personal genome sequencing enable the precise prediction and treatment of disease. At present, DNA-based risk assessment for common complex diseases, application of molecular signatures for cancer diagnosis and prognosis, genome-guided therapy, and dose selection of therapeutic drugs are the important issues in personalized medicine. In order to make personalized medicine effective, these genomic techniques must be standardized and integrated into health systems and clinical workflow. In addition, full application of personalized or genomic medicine requires dramatic changes in regulatory and reimbursement policies as well as legislative protection related to privacy. This review aims to provide a general overview of these topics in the field of personalized medicine.

개인 특성에 따른 정보시스템 내부통제요소 중요도에 관한 연구 (The Priority of Internal Control Factors for Information Systems based on Individual Characteristics)

  • 박종은;이우형;이명호
    • 경영과학
    • /
    • 제21권1호
    • /
    • pp.57-76
    • /
    • 2004
  • The development of informational technology has lead to a sharp change in not only the existing way of operations and management, but the way of human life or thinking as well. Those shifts of the paradigm in information technology have also affected Individuals to the organizational structure. A series of unexpected problems was, however, accompanied by the advance in informational technology, which had broaden its own area of application. Those problems include the losses of property or data the malfunction of systems and their wastefulness would result in, continuous increases in computer crimes, reliability and efficiency of the functional process with the development of information systems, such as the processing problems of inaccurate data, economical issues, and subjects related to safety, as interruptions of privacy, which would result from lots of one's exposure to the drains of personal information. Accordingly, Auditors' roles of information systems, for now, is more important than anything else in that they are responsible for the objective assessment of relevance and effectiveness of internal control systems under the environment of information systems. The objective of the study is, so as to obtain safety of information systems: First, to provide data to line-design internal control systems after finding internal control factors to prevent and eliminate the risks of information systems. Second, to evaluate the priorities of internal control factors with their effective management being considered as the key to settle the problems of risks of information systems. Third, to discriminate what factors affect In evaluating the relative degrees of Importance of internal control factors.

온라인 매체상의 현대식 마녀사냥 이슈와 '유사언론 행위'간 법적·윤리적 논쟁에 대한 고찰 (Legal and Ethical Insight about Witch Hunt Issues on Online News and 'Pseudo Press')

  • 정운갑
    • 한국콘텐츠학회논문지
    • /
    • 제18권7호
    • /
    • pp.1-9
    • /
    • 2018
  • 본 연구는 '언론의 자유' 권리와 '유사언론 행위'라는 주장에 의거한 온라인 신문 규제 주장 간의 충돌 현상을 법적 윤리적 쟁점에 따라 세분화하였다. 이를 위해 2012년부터 2017년까지 온라인 매체 상에 존재하는 현대식 마녀사냥 현상과 관련한 사건들을 조사해 유사언론 행위, 사이비언론 행위에 대한 규제 주장의 근거와 연관 지어 해석하였다. 또한 윤리적 논쟁이 되는 반대 의견으로 언론의 자유와 책임, 이에 반하는 명예권과 프라이버시 권리 등이 충돌할 경우 우선시 되는 권리에 대한 과거 연구들을 종합하고, 5인 이하 소규모 온라인 신문사의 언론의 자유 권리에 대한 최근의 판례 등을 정리하였다. 각 주장의 근거로써 실질 현상으로 나타난 사례들과 이에 대립하는 의견들의 논거 비교를 통해 현재 논쟁 중인 온라인 매체상의 뉴스 행위의 법적 윤리적 문제에 대해 종합적으로 고찰하였다.