• Title/Summary/Keyword: sensitive attribute

Search Result 49, Processing Time 0.024 seconds

Remote Healthcare Monitoring System Using Attribute based Encryption (속성기반 암호화를 이용한 원격 헬스케어 모니터링 시스템)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.63-70
    • /
    • 2012
  • To ensure privacy of individual information in remote healthcare service, health data should be protected through a secure technology such as encryption scheme. Only user who delegated decryption right can access to sensitive health data and delegator needs capability for revocating access privilege. Recently, in ubiquitous environment, CP-ABTD(Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes) which extends CP-ABE(Ciphertext-Policy Attribute-Based Encryption) has been proposed for these requirements. In this paper, we construct remote healthcare monitoring system with delegation and revocation capability for attribute in CP-ABTD. Finally, we analyze collusion attack between users in our system.

A multiplicative unrelated quantitative randomized response model (승법 무관양적속성 확률화응답모형)

  • Lee, Gi-Sung
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.5
    • /
    • pp.897-906
    • /
    • 2016
  • We augment an unrelated quantitative attribute to Bar-Lev et al.'s model (2004) which is composed of sensitive quantitative variable and scrambled one to present a multiplicative unrelated quantitative randomized response model(MUQ RRM). We also establish theoretical grounds to estimate the sensitive quantitative attribute according to circumstances irrespective of known or unknown unrelated quantitative attribute. Finally, we explore the relationship among the suggested model, Eichhorn-Hayre model, Bar-Lev et al.'s model and Gjestvang-Singh's model, and compare the efficiency of our model with Bar-Lev et al.'s model.

An Additive Stratified Quantitative Attribute Randomized Response Model (층화 가법 양적속성 확률화응답모형)

  • Lee, Gi-Sung;Ahn, Seung-Chul;Hong, Ki-Hak;Son, Chang-Kyoon
    • The Korean Journal of Applied Statistics
    • /
    • v.27 no.2
    • /
    • pp.239-247
    • /
    • 2014
  • For a sensitive survey in which the population is composed by several strata with quantitative attributes, we present an additive stratified quantitative attribute randomized response model which applied stratified random sampling instead of simple random sampling to the models of Himmelfarb-Edgell's additive quantitative attribute model and Gjestvang-Singh's. We also establish theoretical grounds to estimate the stratum mean of sensitive quantitative attributes as well as the over all mean. We deal with the proportional and optimal allocation problems in each suggested model and compare the relative efficiency of the suggested two models; subsequently, Himmelfarb-Edgell's model is more efficient than Gjestvang-Singh's model under the condition of stratified random sampling.

An Additive Quantitative Randomized Response Model by Cluster Sampling

  • Lee, Gi-Sung
    • The Korean Journal of Applied Statistics
    • /
    • v.25 no.3
    • /
    • pp.447-456
    • /
    • 2012
  • For a sensitive survey in which the population is comprised of several clusters with a quantitative attribute, we present an additive quantitative randomized response model by cluster sampling that adapts a two-stage cluster sampling instead of a simple random sample based on Himmelfarb-Edgell's additive quantitative attribute model and Gjestvang-Singh's one. We also derive optimum values for the number of 1st stage clusters and the optimum values of observation units in a 2nd stage cluster under the condition of minimizing the variance given constant cost. We can see that Himmelfarb-Edgell's model is more efficient than Gjestvang-Singh's model under the condition of cluster sampling.

Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures (비단조 접근 구조를 갖는 CP-ABE 방식)

  • Sadikin, Rifki;Moon, SangJae;Park, YoungHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control mechanism without a trusted server. We propose an attribute-based access control mechanism by incorporating a CP-ABE scheme to ensure only authorized users can access the sensitive data. The idea of CP-ABE is to include access control policy in the ciphertexts, in which they can only be decrypted if a user possesses attributes that pass through the ciphertext's access structure. In this paper, we prove a secure CP-ABE scheme where the policy can be expressed in non-monotonic access structures. We further compare the performance of our scheme with the existing CP-ABE schemes.

Effective Access Control Mechanism for Protection of Sensitive Personal Information (민감한 개인정보 보호를 위한 효율적인 접근제어 기법)

  • Mun, Hyung-Jin;Kim, Ki-Soo;Um, Nam-Kyung;Li, Yong-Zhen;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7C
    • /
    • pp.667-673
    • /
    • 2007
  • In order to provide the efficient personalized services, the organizations and the companies collect and manage the personal information. The stored data have some slight differences among each subject. Even though the same attribute information leaks out, the personal privacy violation is different according to personal sensitivity. However, currently the organizations or the companies protect all the information as the same level. This paper reflects the sensitive attribute information of the information subject to each personal policy by the encrypting techniques. And then we propose a policy-based access control mechanism for the personal information which strictly prevents unauthorized information users from illegally accessing the personal information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the database. For the access control, information subjects set up their own access control policy for their sensitive personal information. Then it is possible to control the information access by providing the information to the information users according to personal and organizational privacy policy.

Study on the Seismic Random Noise Attenuation for the Seismic Attribute Analysis (탄성파 속성 분석을 위한 탄성파 자료 무작위 잡음 제거 연구)

  • Jongpil Won;Jungkyun Shin;Jiho Ha;Hyunggu Jun
    • Economic and Environmental Geology
    • /
    • v.57 no.1
    • /
    • pp.51-71
    • /
    • 2024
  • Seismic exploration is one of the widely used geophysical exploration methods with various applications such as resource development, geotechnical investigation, and subsurface monitoring. It is essential for interpreting the geological characteristics of subsurface by providing accurate images of stratum structures. Typically, geological features are interpreted by visually analyzing seismic sections. However, recently, quantitative analysis of seismic data has been extensively researched to accurately extract and interpret target geological features. Seismic attribute analysis can provide quantitative information for geological interpretation based on seismic data. Therefore, it is widely used in various fields, including the analysis of oil and gas reservoirs, investigation of fault and fracture, and assessment of shallow gas distributions. However, seismic attribute analysis is sensitive to noise within the seismic data, thus additional noise attenuation is required to enhance the accuracy of the seismic attribute analysis. In this study, four kinds of seismic noise attenuation methods are applied and compared to mitigate random noise of poststack seismic data and enhance the attribute analysis results. FX deconvolution, DSMF, Noise2Noise, and DnCNN are applied to the Youngil Bay high-resolution seismic data to remove seismic random noise. Energy, sweetness, and similarity attributes are calculated from noise-removed seismic data. Subsequently, the characteristics of each noise attenuation method, noise removal results, and seismic attribute analysis results are qualitatively and quantitatively analyzed. Based on the advantages and disadvantages of each noise attenuation method and the characteristics of each seismic attribute analysis, we propose a suitable noise attenuation method to improve the result of seismic attribute analysis.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

Medoid Determination in Deterministic Annealing-based Pairwise Clustering

  • Lee, Kyung-Mi;Lee, Keon-Myung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.3
    • /
    • pp.178-183
    • /
    • 2011
  • The deterministic annealing-based clustering algorithm is an EM-based algorithm which behaves like simulated annealing method, yet less sensitive to the initialization of parameters. Pairwise clustering is a kind of clustering technique to perform clustering with inter-entity distance information but not enforcing to have detailed attribute information. The pairwise deterministic annealing-based clustering algorithm repeatedly alternates the steps of estimation of mean-fields and the update of membership degrees of data objects to clusters until termination condition holds. Lacking of attribute value information, pairwise clustering algorithms do not explicitly determine the centroids or medoids of clusters in the course of clustering process or at the end of the process. This paper proposes a method to identify the medoids as the centers of formed clusters for the pairwise deterministic annealing-based clustering algorithm. Experimental results show that the proposed method locate meaningful medoids.

A Study on the Decision Model Agent System based on the Customer기s Preference in Electronic Commerce (전자상거래에서 고객선호기반의 의사결정모델 에이전트 시스템에 관한 연구)

  • 황현숙;어윤양
    • The Journal of Information Systems
    • /
    • v.8 no.2
    • /
    • pp.91-110
    • /
    • 1999
  • Recently, searching agent systems to help purchase of products between business and customer have been actively studied in Electronic Commerce(EC). However, the most of comparative searching agent systems are only provided customers with searching results by the keyword-based search, and is not support the efficient decision models to be selected products considering the customer's requirements. This paper proposes the decision agent system applied decision model as well as searching functions based on the keyword-input to be selected useful products in EC. The proposed decision agent system is consist of the user interface, provider interface, decision model. Especially, as the example of the decision model, this paper is designed and implemented the prototype of decision agent system which is normalized the searching data and value of customer's preference weight as to each attribute, and orderly provided customers with computed results. This agent system is also carried out sensitive analysis according to the reflection ratio of the each attribute.

  • PDF