• Title/Summary/Keyword: Anonymity

Search Result 474, Processing Time 0.088 seconds

An Efficient Algorithm of Data Anonymity based on Anonymity Groups (익명 그룹 기반의 효율적인 데이터 익명화 알고리즘)

  • Kwon, Ho Yeol
    • Journal of Industrial Technology
    • /
    • v.36
    • /
    • pp.89-92
    • /
    • 2016
  • In this paper, we propose an efficient anonymity algorithm for personal information protections in big data systems. Firstly, we briefly introduce fundamental algorithms of k-anonymity, l-diversity, t-closeness. And then we propose an anonymity algorithm using controlling the size of anonymity groups as well as exchanging the data tuple between anonymity groups. Finally, we demonstrate an example on which proposed algorithm applied. The proposed scheme gave an efficient and simple algorithms for the processing of a big amount of data.

  • PDF

A Method of Anonymity Authentication using the Public Certificate (공인인증서를 이용한 익명인증 방법)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.115-129
    • /
    • 2010
  • As the fixed mobile communication tools using the internet are developed, the off-line services are serviced through on-line on the internet. our society is divided into the real world and the cyber world. In the cyber world, the authentication to the user is absolutely required. The authentication is divided into the real-name authentication and the anonymous authentication by the kind of the internet service provider. There are some ISPs needed the real-name authentication and there are others ISPs needed the anonymity authentication. The research about the anonymity authentication is steadily established to these days. In this paper, we analyze the problem about blind signature, group signature, ring signature, and traceable signature. And we propose a method of anonymity authentication using the public certificate. In the proposal, the anonymity certificate have the new structure and management. Certificate Authority issues several anonymity certificates to a user through the real-name authentication. Several anonymity certificates give non-linked and non-traceability to the attacker.

An Empirical Study on the Effect of Technical and Social Anonymity on the Self-control Behavior (온라인 커뮤니티에서 기술적, 사회적 익명성이 자기통제에 미치는 영향에 관한 연구)

  • Choi, Hee-Jai;Lee, Zoon-Ky;Kim, Jung-Won
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.63-74
    • /
    • 2009
  • There have been many previous studies about an effect of anonymity on self control behavior. However the previous studies are on the aspect of results such as the usefulness, the problems of cyber crime or a lack of trust by anonymity. This study identifies the accurate definition of the objective technical anonymity and subjective social anonymity. And it reveals the relationship among technical anonymity, social anonymity, community tie, and self control as an effect of anonymity. The result of survey shows that technical anonymity affects self control through social anonymity and the relationship between technical and social anonymity is affected by community tie. This study presents how the anonymity affects individual behaviors. So it can be used as a reference to the policy on anonymity of the internet.

  • PDF

A Study on An Enhancement Scheme of Privacy and Anonymity through Convergence of Security Mechanisms in Blockchain Environments (블록체인 환경에서 보안 기법들의 융합을 통한 프라이버시 및 익명성 강화 기법에 대한 연구)

  • Kang, Yong-Hyeog
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.75-81
    • /
    • 2018
  • Anonymity and privacy issues are becoming important as all transactions in the blockchain are open to users. Public blockchains appear to guarantee anonymity by using public-key addresses on behalf of users, but they can weaken anonymity by tracking with various analytic techniques based on transaction graph. In this paper, we propose a scheme to protect anonymity and privacy by converging various security techniques such as k-anonymity, mixing, blind signature, multi-phase processing, random selection, and zero-knowledge proof techniques with incentive mechanism and contributor participation. Through performance analysis, our proposed scheme shows that it is difficult to invade privacy and anonymity through collusion attacks if the number of contributors is larger than that of conspirators.

Mobile Communication Group Polarization: Effects of Communication Cues and Anonymity

  • Suh, Eung-Kyo
    • Journal of Distribution Science
    • /
    • v.14 no.8
    • /
    • pp.101-112
    • /
    • 2016
  • Purpose - The objective of this study is to identify the effects of the communication cues and anonymity on group polarization in mobile communication settings, both in terms of route and extent. Research design, data and methodology - Laboratory experiments were conducted to achieve the above research objective; the effect of communication cues on group polarization with social presence as mediation and the direct effect of anonymity, social presence, and perceived cohesion were analyzed. The experiments were conducted by the participation of 240 people, who were divided into 48 groups of 5 people. Results - According to the results, the difference in intergroup polarization due to communication cues and anonymity was insignificant. From this analysis, the structural equation model, communication cues and anonymity did not affect group polarization through social presence. Moreover, anonymity did not affect group polarization through perceived cohesion; however, anonymity directly affected group polarization. Conclusions - This research can help to explain the discussions and the related decision-making actions on internet forums, which have recently come to the rise as well as provide foundational basis in newly establishing policies for the forums.

The Effect of Anonymity on Virtual Team Performance in Online Communities (온라인 커뮤니티 내 익명성이 가상 팀 성과에 미치는 영향)

  • Lee, Un-Kon;Lee, Aeri;Kim, Kyong Kyu
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.217-241
    • /
    • 2015
  • One of the challenges in online community management is what level of perceived anonymity can be granted to encourage active participation from members while discouraging unhealthy activities. Few studies developed a scheme of anonymity and investigated how different levels of anonymity influence community activities. This study develops a classification scheme of anonymity encompassing the following three different levels : (1) real name(no anonymity), (2) nickname (partial anonymity), and (3) random assignment of a temporal ID (complete anonymity). Then, it examines how different levels of anonymity influence trust and perceived risk, which in turn affect virtual team performance. A series of laboratory experiments were performed, manipulating the levels of anonymity, in the context of well-structured communities that allow prior interactions among community members. The data was collected from 364 laboratory participants and analyzed using ANOVA and PLS. The results indicate that the difference of anonymity between (2) and (3) had not be significant and the only (1) could not guarantee the anonymity. The impact of anonymity on trust and perceived risk could not be significant in this situation. These findings could contribute to make more beneficial member identification strategies in online community practice.

A Study of Factors Affecting Group Polarization in Online Communication : Based on Anonymity (온라인 커뮤니케이션에서 집단극화 현상에 영향을 미치는 요인에 관한 연구: 익명성 관점에서)

  • Suh, Eung-Kyo
    • Journal of Distribution Science
    • /
    • v.13 no.2
    • /
    • pp.75-83
    • /
    • 2015
  • Purpose - This study aims to identify the effects of communication cues, anonymity, and social presence on group polarization in computer-mediated communication (CMC) settings. Extant literature has introduced some theoretical backgrounds of social presence and SIDE (Social Identity model of Deindividuation Effects) to explain the effects of communication cues and anonymity. The concept of social presence emphasized the mediating role on communication cues and anonymity. However, most literature did not measure social presence and compare group polarization of all condition groups. This does not sufficiently explain the result of group polarization. Research design, data, and methodology - We believe that the direct impact of anonymity on group polarization can provide a more admissible and clearer explanation for the results. In addition, this study categorizes anonymity into two levels, as anonymity of group and anonymity of self. To justify the anonymity view, a laboratory experiment was conducted. The experiment was conducted in communication cues settings (visual cue; without visual cue) and anonymity settings (identified; anonymous). Each of the four settings has 10 groups consisting of five subjects each (total 200 subjects). The subjects are undergraduates from a large university, majoring in business. All experimental procedures and calculations of choice shift and preference change follow the literature. Results - First, the removal of visual cues does not produce a significant impact on group polarization, which cannot be explained by the social presence view. Second, the anonymous condition does not significantly affect group polarization, which also cannot be explained by the social presence view. However, the anonymous condition directly affects group polarization. Specifically, anonymity of self has a stronger effect on group polarization than anonymity of group. The result explains about the leading factor affecting group polarization. This study examines another view of how computer-mediated communication may be associated with group polarization. The process and outcome data from the experiment reveal that group polarization is not affected by level of social presence, but by level of anonymity. Group discussions conducted with visual cue CMC setting and identified CMC setting result in weaker group polarization. Conversely, group discussions conducted without visual cue CMC setting and anonymous CMC setting lead to stronger group polarization. The results of the study have the following implications. First, they provide clues for business organizations to design the most appropriate media conditions and preemptive social conditions to implement when making group decisions through CMC, to maximize achievements, generate amicable agreements, or actively share information. Second, this study can be useful in analyzing different adverse effects generated through Internet use. Conclusions - This research can help explain discussions and decision-making actions on Internet forums, which have recently increased, as well as providing a foundational basis in newly establishing policies for the forums. Finally, it should be noted that many other factors such as group size, topics, and group history may affect group polarization. These should be examined in future studies.

Traceable Authentication Scheme Providing User Anonymity (사용자 익명성을 제공하는 추적 가능한 인증 프로토콜)

  • Choi, Jong-Seok;Shin, Seung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.95-102
    • /
    • 2009
  • Recently, remote user authentication scheme protecting user anonymity using smart card has been researched with interest increasing on user privacy. Although authentication scheme providing user anonymity using smart card had been proposed by Das et al, Chien et al. pointed out Das et al. scheme fail to provide user anonymity and proposed new scheme to overcome the problem. A remote system Kim et al. proposed a scheme which is traceable about malicious user with protecting user anonymity. In this paper, we point out that Kim et a1. scheme fail to provide user anonymity and propose a scheme for some problems Kim et al. scheme has. And then we analysis our scheme on cryptophic security and efficiency with Kim scheme.

Preserving User Anonymity in Context-Aware Location-Based Services: A Proposed Framework

  • Teerakanok, Songpon;Vorakulpipat, Chalee;Kamolphiwong, Sinchai;Siwamogsatham, Siwaruk
    • ETRI Journal
    • /
    • v.35 no.3
    • /
    • pp.501-511
    • /
    • 2013
  • Protecting privacy is an important goal in designing location-based services. Service providers want to verify legitimate users and allow permitted users to enjoy their services. Users, however, want to preserve their privacy and prevent tracking. In this paper, a new framework providing users with more privacy and anonymity in both the authentication process and the querying process is proposed. Unlike the designs proposed in previous works, our framework benefits from a combination of three important techniques: k-anonymity, timed fuzzy logic, and a one-way hash function. Modifying and adapting these existing schemes provides us with a simpler, less complex, yet more mature solution. During authentication, the one-way hash function provides users with more privacy by using fingerprints of users' identities. To provide anonymous authentication, the concept of confidence level is adopted with timed fuzzy logic. Regarding location privacy, spatial k-anonymity prevents the users' locations from being tracked. The experiment results and analysis show that our framework can strengthen the protection of anonymity and privacy of users by incurring a minimal implementation cost and can improve functionality.

Packet Replacement Technique for Securing Anonymity in P2P Network (P2P 네트워크에서 익명성 보장을 위한 패킷 대치 기법)

  • Kim Byung Ryong;Kim Ki Chang
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.331-338
    • /
    • 2005
  • Flooding based P2P system basically provides anonymity and under the anonymity circumstances user and provider exchange information. Most of packets transferred from node to node do not contain identity information on node that sent packet. And these packets are transmitted to the destination through the routing systems dynamically composed of intermediate nodes. Therefore it is impossible to know who transmitted it for the first and who the designated recipient is. But since downloading and uploading host's IP address is exposed it does not provide anonymity. This study introduces techniques to provide anonymity for protecting identification of users and resource Providers by replacing QueryHit Packets in systems where anonymity can cause trouble.