• Title/Summary/Keyword: sensitive attribute

Search Result 49, Processing Time 0.025 seconds

A Study on Performing Join Queries over K-anonymous Tables

  • Kim, Dae-Ho;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.7
    • /
    • pp.55-62
    • /
    • 2017
  • Recently, there has been an increasing need for the sharing of microdata containing information regarding an individual entity. As microdata usually contains sensitive information on an individual, releasing it directly for public use may violate existing privacy requirements. Thus, to avoid the privacy problems that occur through the release of microdata for public use, extensive studies have been conducted in the area of privacy-preserving data publishing (PPDP). The k-anonymity algorithm, which is the most popular method, guarantees that, for each record, there are at least k-1 other records included in the released data that have the same values for a set of quasi-identifier attributes. Given an original table, the corresponding k-anonymous table is obtained by generalizing each record in the table into an indistinguishable group, called the equivalent class, by replacing the specific values of the quasi-identifier attributes with more general values. However, query processing over the anonymized data is a very challenging task, due to generalized attribute values. In particular, the problem becomes more challenging with an equi-join query (which is the most common type of query in data analysis tasks) over k-anonymous tables, since with the generalized attribute values, it is hard to determine whether two records can be joinable. Thus, to address this challenge, in this paper, we develop a novel scheme that is able to effectively perform an equi-join between k-anonymous tables. The experiment results show that, through the proposed method, significant gains in accuracy over using a naive scheme can be achieved.

A Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values (SQL 질의 애트리뷰트 값 제거 방법을 이용한 효과적인 SQL Injection 공격 탐지 방법 연구)

  • Lee, In-Yong;Cho, Jae-Ik;Cho, Kyu-Hyung;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.135-148
    • /
    • 2008
  • The expansion of the internet has made web applications become a part of everyday lift. As a result the number of incidents which exploit web application vulnerabilities are increasing. A large percentage of these incidents are SQL Injection attacks which are a serious security threat to databases with potentially sensitive information. Therefore, much research has been done to detect and prevent these attacks and it resulted in a decline of SQL Injection attacks. However, there are still methods to bypass them and these methods are too complex to implement in real web applications. This paper proposes a simple and effective SQL Query attribute value removal method which uses Static and Dynamic Analysis and evaluates the efficiency through various experiments.

The change of land cover classification accuracies according to spatial resolution in case of Sunchon bay coastal wetland (위성영상 해상도에 따른 순천만 해안습지의 분류 정확도 변화)

  • Ku, Cha-Yong;Hwang, Chul-Sue
    • Journal of the Korean association of regional geographers
    • /
    • v.7 no.1
    • /
    • pp.35-50
    • /
    • 2001
  • Since remotely sensed images of coastal wetlands are very sensitive to spatial resolution, it is very important to select an optimum resolution for particular geographic phenomena needed to be represented. Scale is one of the most important factors in spatial analysis techniques, which is defined as a spatial and temporal interval for a measurement or observation and is determined by the spatial extent of study area or the measurement unit. In order to acquire the optimum scale for a particular subject (i.e., coastal wetlands), measuring and representing the characteristics of attribute information extracted from the remotely sensed images are required. This study aims to explore and analyze the scale effects of attribute information extracted from remotely sensed coastal wetlands images. Specifically, it is focused on identifying the effects of scale in response to spatial resolution changes and suggesting a methodology for exploring the optimum spatial resolution. The LANDSAT TM image of Sunchon Bay was classified by a supervised classification method, Six land cover types were classified and the Kappa index for this classification was 84.6%. In order to explore the effects of scale in the classification procedure, a set of images that have different spatial resolutions were created by a aggregation method. Coarser images were created with the original image by averaging the DN values of neighboring pixels. Sixteen images whose resolution range from 30 m to 480 m were generated and classified to obtain land cover information using the same training set applied to the initial classification. The values of Kappa index show a distinctive pattern according to the spatial resolution change. Up to 120m, the values of Kappa index changed little, but Kappa index decreased dramatically at the 150m. However, at the resolution of 240 m and 270m, the classification accuracy was increased. From this observation, the optimum resolution for the study area would be either at 240m or 270m with respect to the classification accuracy and the best quality of attribute information can be obtained from these resolutions. Procedures and methodologies developed from this study would be applied to similar kinds and be used as a methodology of identifying and defining an optimum spatial resolution for a given problem.

  • PDF

Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment (응급 상황에서 환자의 프라이버시를 보장하는 속성기반 접근 제어 프로토콜)

  • Jeong, Yoon-Su;Han, Kun-Hee;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.279-284
    • /
    • 2014
  • Recently, m-health care is be a problem that the patient's information is easily exposed to third parties in case of emergency situation. This paper propose an attribute-based access control protocol to minimize the exposure to patient privacy using patient information in the emergency environment. Proposed protocol, the patient's sensitive information to a third party do not expose sensitive information to the patient's personal health information, including hospital staff and patients on a random number to generate cryptographic keys to sign hash. In addition, patient information from a third party that is in order to prevent the illegal exploitation of the patient and the hospital staff to maintain synchronization between to prevent the leakage of personal health information.

Fuzzy Keyword Search Method over Ciphertexts supporting Access Control

  • Mei, Zhuolin;Wu, Bin;Tian, Shengli;Ruan, Yonghui;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5671-5693
    • /
    • 2017
  • With the rapid development of cloud computing, more and more data owners are motivated to outsource their data to cloud for various benefits. Due to serious privacy concerns, sensitive data should be encrypted before being outsourced to the cloud. However, this results that effective data utilization becomes a very challenging task, such as keyword search over ciphertexts. Although many searchable encryption methods have been proposed, they only support exact keyword search. Thus, misspelled keywords in the query will result in wrong or no matching. Very recently, a few methods extends the search capability to fuzzy keyword search. Some of them may result in inaccurate search results. The other methods need very large indexes which inevitably lead to low search efficiency. Additionally, the above fuzzy keyword search methods do not support access control. In our paper, we propose a searchable encryption method which achieves fuzzy search and access control through algorithm design and Ciphertext-Policy Attribute-based Encryption (CP-ABE). In our method, the index is small and the search results are accurate. We present word pattern which can be used to balance the search efficiency and privacy. Finally, we conduct extensive experiments and analyze the security of the proposed method.

Beauty in White Make-up Powder (白粉) Advertisements in the 1920s and 1930s -Aesthetic Expression in the Era of Modern Cosmetics Advertisement- (1920~1930년대의 백분(白粉)광고에 나타난 미(美) -근대 화장광고시대의 미적 표현-)

  • Baek, Ju Hyun;Chae, Keum Seok
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.43 no.2
    • /
    • pp.255-273
    • /
    • 2019
  • Perceptions of beauty change and are shared with others in the media of emotional words. In the modern age, a mix of traditional and modern make-up cultures has changed the standards of beauty. Therefore, an analysis using emotional words (an image that consumers have for certain subjects) and an image scale that intuitively shows them can be an important means for understanding changes in the "beauty of the time". This paper considered changes in typical aesthetic characteristics that women pursued through make-up by analyzing emotional words in white make-up powder advertisement texts from the 1920s through the 1930s. Imported modern technologies changed cosmetic manufacturing techniques and advertising methods to create a momentum that changed women's make-up culture from light to heavy make-up or from white to color make-up. Such changes have led to changes in the perception of beauty and were expressed through sensitive vocabularies such as pure, new, fresh, lofty, lively, healthy, and cheery. Such changes reflect social aspects such as women's aspirations for high status, pursuit of security, or women's roles under the wartime regime to show a change from beauty with an attribute of [+cool] to that of [+soft].

The impact of outdoor environment on residential noise level satisfaction: GIS-based Analysis

  • Choi, Ga-Yoon;Jung, Hye-Jin;Lee, Jae Seung
    • Journal of KIBIM
    • /
    • v.11 no.1
    • /
    • pp.39-46
    • /
    • 2021
  • Urban residents in crowded complexes are making increasing civil complaints about noise and demanding pleasant and comfortable residential environments. Because noise is one of the most important factors related to urban residents' dissatisfaction with their living environments, the present study investigates the direct and indirect effects of noise-related outdoor environmental factors on residential level satisfaction, using noise level data from 29 noise-measuring stations in Seoul. From 62 multi-family apartment complexes near these stations, the authors collected GIS-based environmental attribute data, as well as survey data including the residents' personal characteristics and indicators designed to measure latent psychological characteristics: noise sensitivity and residential noise level satisfaction. This study then utilized structural equation models to analyze the direct variables influencing the latent variables of noise sensitivity and residential noise level satisfaction, as well as the complex relationships among all variables. The result showed that residents who are exposed to less noise, possibly due to living in apartments facing relatively quiet roads, protected by soundproof walls, or surrounded by densely planted trees, tend to be less noise sensitive, which makes them more satisfied with the ambient noise level. Therefore, critical outdoor environmental variables can be used to reduce noise sensitivity and improve residential noise level satisfaction.

Analysis of Data Encryption Mechanisms for Searchable Encryption (검색가능 암호시스템을 위한 데이터 암호기법의 문제점 분석)

  • Son, Junggab;Yang, Yu-Jin;Oh, Heekuck;Kim, Sangjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.79-89
    • /
    • 2013
  • Recently, the need for outsourcing sensitive data has grown due to the wide spreading of cost-effective and flexible cloud service. However, there is a fundamental concern in using such service since users have to trust external servers. Therefore, searchable encryption can be a very valuable tool to meet the security requirements of data outsourcing. However, most of work on searchable encryption focus only on privacy preserving search function and relatively lacks research on encryption mechanism used to actually encrypt data. Without a suitable latter mechanism, searchable encryption cannot be deployed in real world cloud services. In this paper, we analyze previously used and possible data encryption mechanisms for multi-user searchable encryption system and discuss their pros and cons. Our results show that readily available tools such as broadcast encryption, attribute-based encryption, and proxy re-encryption do not provide suitable solutions. The main problem with existing tools is that they may require separate fully trusted servers and the difficulty in preventing collusion attacks between outsiders and semi-trusted servers.

Data mining Algorithms for the Development of Sasang Type Diagnosis (사상체질 진단검사를 위한 데이터마이닝 알고리즘 연구)

  • Hong, Jin-Woo;Kim, Young-In;Park, So-Jung;Kim, Byoung-Chul;Eom, Il-Kyu;Hwang, Min-Woo;Shin, Sang-Woo;Kim, Byung-Joo;Kwon, Young-Kyu;Chae, Han
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.23 no.6
    • /
    • pp.1234-1240
    • /
    • 2009
  • This study was to compare the effectiveness and validity of various data-mining algorithm for Sasang type diagnostic test. We compared the sensitivity and specificity index of nine attribute selection and eleven class classification algorithms with 31 data-set characterizing Sasang typology and 10-fold validation methods installed in Waikato Environment Knowledge Analysis (WEKA). The highest classification validity score can be acquired as follows; 69.9 as Percentage Correctly Predicted index with Naive Bayes Classifier, 80 as sensitivity index with LWL/Tae-Eum type, 93.5 as specificity index with Naive Bayes Classifier/So-Eum type. The classification algorithm with highest PCP index of 69.62 after attribute selection was Naive Bayes Classifier. In this study we can find that the best-fit algorithm for traditional medicine is case sensitive and that characteristics of clinical circumstances, and data-mining algorithms and study purpose should be considered to get the highest validity even with the well defined data sets. It is also confirmed that we can't find one-fits-all algorithm and there should be many studies with trials and errors. This study will serve as a pivotal foundation for the development of medical instruments for Pattern Identification and Sasang type diagnosis on the basis of traditional Korean Medicine.

A Study on the Influence of Consumer Choice on the Preference Reversals by Product Attribute : Focusing on Comparison of Medical Service Products and General Products (제품의 속성별 선호역전에 따른 소비자의 선택변화 영향 연구 : 의료서비스 상품과 일반 제조품 비교 중심으로)

  • Han, Yong-Jun;Jo, Seong-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.122-132
    • /
    • 2019
  • This study investigated the effects of preference reversal according to product characteristics and situation. To investigate the relationship between consumer preference reversal and selection change, three research problems were set up and multiple logistic regression analysis was performed considering categorical dependent variables. The results showed that the decrease in preference for the medical service products and general manufacturing products had a significant effect on selection change and selection delay. In addition, we found that selection change according to the importance of attributes in the medical service product was more sensitive than the general product, while selection change according to the preference reversal was higher in general products. This study examined the causal relationship between choices by illuminating the preference concept as the central value of consumers from a different viewpoint than the existing preference and preference inversion research. In addition, the results of this study suggest that it can include not only selective change according to preference reversal, but also alternatives such as selective delay.