DOI QR코드

DOI QR Code

A Study on Structural Holes of Privacy Protection for Life Logging Service as analyzing/processing of Big-Data

빅데이터 분석/처리에 따른 생활밀착형 서비스의 프라이버시 보호 측면에서의 구조혈 연구

  • 강장묵 (고려대학교 정보창의교육연구소) ;
  • 송유진 (동국대학교 정보경영학과)
  • Received : 2014.01.11
  • Accepted : 2014.02.07
  • Published : 2014.02.28

Abstract

SNS (Social Network Service) has evolved to life-friendly service with the combination of local services. Unlike exsiting mobile services, life-friendly service is expected to be personalized with gathering of local information, location information and social network service information. In the process of gathering various kinds of information, Big-data technology and Cloud technology is needed. The effective algorithem has researched for this already, however the privacy protection model hasn't researched enough in life-friendly service or big-data using circumstance. In this paper, the privacy issue is dealt with in terms of 'Structure hole', and the privacy issue comes from big-data technology of life-friendly service.

네트워크 서비스는 로컬서비스와 결합하면서 생활밀착형 서비스로 발전하고 있다. 생활밀착형 서비스는 기존의 모바일 서비스와는 달리, 위치정보와 로컬정보 그리고 소셜 네트워크서비스 정보 등을 모아 개인화된 서비스를 제공할 것으로 예상된다. 여러 정보를 모아 처리하는 과정에서 빅데이터 기술, 클라우드 기술 등이 필요하다. 이미 이에 대한 효율성 높은 알고리즘이 연구되고 있으나 반면, 생활 밀착형 서비스 모델 또는 빅데이터 환경에서의 프라이버시 보호 모델에 대한 연구는 상대적으로 미흡한 편이다. 이 글은 생활밀착형 서비스에 활용될 빅데이터 기술이 야기하는 프라이버시 문제에 대하여 구조혈 중심으로 다룬다.

Keywords

References

  1. Castells, M. "Communication Power", Oxford: Oxford University Press, 2009.
  2. McKinsey Global Institute, "Big data : The Next frontier for innovation, competition, and productivity", 2011.
  3. Hwansoo Lee, Dongwon Lim, Hangjung Zo, "Personal Information Overload and User Resistance in the Big Data Age", Journal Intell Inform Syst 2013 March: 19(1): 125-139.
  4. JangMook Kang, "Bigdata and Privacy", 4slides, http://www.slideshare.net/mooknc/130619ver1 or http://blog.naver.com/PostView.nhn?blogId=youngd isplay&logNo=60165775435
  5. Ahn, C. W. and S. G. Hwang, "Big Data technologies and main issues", Journal of Korean Institute of Information Scientist and Engineers, Vol.30, No.6(2012), 10-17.
  6. Yun-Hee Kang, "Performance Analysis of MapReduce Application on Private Cloud by using OpenStack", Journal of KIIT. Vol. 11, No. 12, Dec. 31, 2013. p. 179.
  7. Jang-Mook Kang, Woo-Jin Lee, You-Jin Song, "A Study for Vulnerability Analysis and Guideline about Social Personal Broadcasting Service based on Smart-Phone Environment (focus on SNS or U-Health)", Journal of the institute of internet, broadcasting and communication, vol. 10, (6), 2010. p. 164. table 1
  8. Jang-Mook Kang, Woo-Jin Lee, You-Jin Song, "A Study for Vulnerability Analysis and Guideline about Social Personal Broadcasting Service based on Smart-Phone Environment (focus on SNS or U-Health)", Journal of the institute of internet, broadcasting and communication, vol. 10, (6), 2010. p. 164.
  9. http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201204_kr.pdf
  10. Kyung-Bae Min, Jang-Mook Kang, "Rights to Control Information and Related Security Technologies on the CyberSpace", Journal of the institute of internet, broadcasting and communication, vol. 10, 2ho, p. 136.

Cited by

  1. A Study on the Weight Allocation Method of Humanist Input Value and Multiplex Modality using Tacit Data vol.14, pp.4, 2014, https://doi.org/10.7236/JIIBC.2014.14.4.157
  2. Key-pair(Public key, Private key) conflict analysis using OpenSSL vol.15, pp.8, 2014, https://doi.org/10.5762/KAIS.2014.15.8.5294
  3. Study on Decision-making and Control of Personal Data Posted on the Internet vol.14, pp.4, 2014, https://doi.org/10.7236/JIIBC.2014.14.4.227