DOI QR코드

DOI QR Code

A Strategy Study on Sensitive Information Filtering for Personal Information Protect in Big Data Analyze

  • Koo, Gun-Seo (Dept. of Digital Media, Soongeui Women's College)
  • 투고 : 2017.11.01
  • 심사 : 2017.11.25
  • 발행 : 2017.12.29

초록

The study proposed a system that filters the data that is entered when analyzing big data such as SNS and BLOG. Personal information includes impersonal personal information, but there is also personal information that distinguishes it from personal information, such as religious institution, personal feelings, thoughts, or beliefs. Define these personally identifiable information as sensitive information. In order to prevent this, Article 23 of the Privacy Act has clauses on the collection and utilization of the information. The proposed system structure is divided into two stages, including Big Data Processing Processes and Sensitive Information Filtering Processes, and Big Data processing is analyzed and applied in Big Data collection in four stages. Big Data Processing Processes include data collection and storage, vocabulary analysis and parsing and semantics. Sensitive Information Filtering Processes includes sensitive information questionnaires, establishing sensitive information DB, qualifying information, filtering sensitive information, and reliability analysis. As a result, the number of Big Data performed in the experiment was carried out at 84.13%, until 7553 of 8978 was produced to create the Ontology Generation. There is considerable significan ce to the point that Performing a sensitive information cut phase was carried out by 98%.

키워드

참고문헌

  1. Oh, J. Y, Sun M. R, "A Case Study and Analysis of a Big Data make use caused by Personal Information Protect legislation", National Information Society Agency(NIA), No. 4., 2015.12.
  2. M. K. Kim, Personal Information Protect Consultation Cases, Korea Internet & Security Agency(KISA), 21pp. 2017. 1.
  3. B-Y Lee, "Utilization of Social Media Analysis using Big Data", Journal of the Korea Contents Association 13(2), 211-219. 2013.2, https://doi.org/10.5392/JKCA.2013.13.02.211
  4. M. K. Kim, "Personal Information Protect a Fact-Finding Survey",National Information Society Agency(NIA), No. 4., 2015.12.
  5. J. S. Choi, Personal Information Protect How to Use & Protect, Personal Information Protect Practice guide Vol. 6., Security news, 2016.6.9.
  6. D. S. Park, etc, Bigdata Computing Technology, Published by Hanbit Academy, pp.30-35. 2015.1.19.
  7. G. S. Koo, "A Study on Customized Employment Strategy for Women's College Students Utilizing Big Data", Journal of The Korea Society of Computer and Information, Vol. 12 No. 5, pp. 73-81, 2015. 2. https://doi.org/10.12733/jics20105102
  8. G. S. Koo, "The FE-MCBP for Recognition of the Titled New-Type Vehicle License Plate" Journal of The Korea Society of Computer and Information, Vol. 12 No. 5, pp. 73-81, 2007.
  9. G. S. Koo, "Edge Feature Extract CBIRS for Car Retrieval : CBIRS/EFI", Journal of The Korea Society of Computer and Information, Vol. 15 No. 11, pp. 75-82, 2010. https://doi.org/10.9708/jksci.2010.15.11.075
  10. G, B, Lee, "Implementation of Smart Government Using Bigdata", NISC, pp. 15-23, 2011.
  11. National Information Society Agency(NIA), "IT & Future Strategy," No. 3. 2012. 4.