Dynamic Sensitivity Level Measurement for Privacy Protection

In Joo Jang, Hyeong Seon Yoo

Abstract


For social demand and technological development, systematic private information management and security guidance have been enhanced; however, the issue of leakage and invasion of private information is shown in many ways. In the management of such private information, the issue of how to protect such information is one of the sensitive key elements. As a criterion to decide the management policy of each property informationconsisting of private information, this article suggests Dynamic-Security-Level-Measurementfor property information. DSLM adopts the variable characteristics of property informationas the element of measurement. By applying this method, it is possible to provide information management functions to cope with the changes of each property information security level of an individual actively. It is expected that this will improve the security of previous information management methods even more and also contribute to the improvement of security in integrated systems such as the integrated ID management system and electronic wallet.


Full Text:

PDF

References


남기효, 박상중, 강형석, 남기환, 김성인, “개인정보보호 기술의 최신 동향과 향후 전망”, 정보보호학회논문지, 제18권, 제6호, pp. 11-19, 2009.

윤상오, “전자정부 구현을 위한 개인 정보 보호 정책에 관한 연구 : 정부신뢰 구축의 관점에서”, 한국지역정보화학회지, 제12권, 제2호, pp. 1-29, 2009.

이재광, 장종수, 박기식, “사이버 공간에서의 개인정보보호”, 한국정보사회학회, 정보와 사회, 제12권, pp. 51-65, 2007.

이해규, “인터넷 환경에서의 사용자 중심 ID 정보관리 모델에 관한 연구”, 정보보호학회논문지, 제19권, 제3호, pp. 37-50, 2009.

장인주, “User-centric Personal Information Management Model for Privacy Protection,” 인하대학교, Thesis, 2010.

Ahn, G. J., “User-centric Privacy Management for Federated Identity Management,” Collaborate Com ’07, pp. 187-195, 2007.

Bhargav-Spantzel, Squicciarini, A. C., and Bertino, E., “Integrating Federated Digital Identity Management and trust Negotiation-issues and solutions,” Security and Privacy Magazine, IEEE, Vol. 5, No. 2, pp. 55-64, 2007.

Bonatti, P., “Driving and Monitoring Provisional Trust Negotiation with Metapolicies,” IEEE POLICY ’05, pp. 14-23, 2005.

Burmeister, P., “Treating Incomplete Knowledge in Formal Concept Analysis,” LNAI 3626, pp. 114-126, 2005.

Canard, S., “Identity Federation and Privacy : One Step Beyond,” DIM ’08, pp. 25-37, 2008.

Deng, M., Cock, D. D., and Preneel, B., “toward a cross-context identity management framework in e-health,” Online Information Review, Vol. 33, No. 3, pp. 422-442, 2009.

Garcon, K., “Security and Privacy System Architecture for an e-Hospital Environment,” in Idtrust ’08 IBE, PBE, automated encryption processing, 2008.

Josang, A., AlZomai, M., and Suriadi, S. “Usability and Privacy in Identity Management Architectures,” AISW ’07, pp. 143- 152, 2007.

Josang, A., Fabre, J., Hay, B., Dalziel, J., and Pope, S., “Trust Requirements in Identity Management,” Proceeding of the AISW ’05, pp. 99-108, 2005.

Park, H.-A., “Privacy-Aware Access Control through Negotiation in Daily Life Service,” LNCS 5075, pp. 514-519, 2008.

Preibusch, S., “Ubiquitous social networks-opportunities and challenges for privacy-aware user modelling,” DM. UM ’07, pp. 698-721, 2007.

Protege 3.1. [cited; Available from : http://protege.stanford.edu/doc/users.html.

Qian Wang, Wiangling Shi, “Privacy Protection Based on l-Diversity,” WCSE ’09, pp. 367-372, 2009.

Satchell, C., Shanks, G., Howard, S., and Murphy, J., “Identity crisis : user perspectives on multiplicity and control in federated identity management,” Behaviour and Information Technology ’09, pp. 1-12, 2009.

Spantzel, A. B., Squiiciiarini, A. C., and Bertino, E., “Trust Negotiations in Identity Management,” IEEE S&P 2007, pp. 55- 63, 2007.

Squicciarini, A. C., Elisa Bertino, E. Ferrari, and I. Ray, “Achieving Privacy in Trust Negotiations with an Ontology- Based Approach,” IEEE Transactions on Dependable and Secure Computing, Vol. 3, pp. 13-31, 2004.

Squicciarini, A. C. and Barghav, A., “Trust Negotiations with Customizable Anonymity,” Proceed of the IEEE/WIC/ ACM, pp. 69-72, 2006.

Sweeney, L., “k-Anonymity : A Model for protecting Privacy Fuzziness and Knowledge-based Systems,” Vol. 10, No. 5, pp. 557-570, 2002.

Wille, R., “Formal Concept Analysis as Mathematical Theory of Concepts and Concept Hierarchies,” LNAI 3626, pp. 1-33, 2005.


Refbacks

  • There are currently no refbacks.