DOI QR코드

DOI QR Code

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research

사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구

  • Lee, Jong-Sik (Department of Interaction Science, Sungkyunkwan University)
  • 이종식 (성균관대학교 인터랙션사이언스학과)
  • Received : 2018.02.02
  • Accepted : 2018.04.20
  • Published : 2018.04.28

Abstract

Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

최근 인터넷 기술이 급격히 발전하면서 컴퓨터 관련 기술이 함께 발달하면서 컴퓨터와 스마트 디바이스를 둘러싼 소프트웨어 분쟁이 심화 되고 있고 또한 각국의 정책적으로 소프트웨어 개발에 소리 없는 전쟁이 진행되고 있는 상태이다. 특히 최근 빅데이터와 사물인터넷 IoT (Internet of Things) 인터넷 기반의 관련 산업이 급격히 발전하고 있으며 여기에 사용된 java 와 C 언어,xcode의 오픈소스 기반의 소스프로그램을 만들고 개발하기 위하여 수많은 시간을 투자하여 개발이 이루어지고 있다. 기본적으로 소프트웨어의 침해를 방지하고자 보안 방법이 존재 하지만 생각보다 쉽게 복제되는 것이 현실이다. 이런 상황일수록 소스프로그램의 라이센스에 대한 원천 권리자의 권리보호 매우 중요한 사항이다. 물론 제작자의 원천기술을 당연히 보호되어야 함이 마땅하나 너무 지나친 보호는 프로그램으로 인한 산업발전과 문화발전에 저해 될 수 있는 소지가 존재한다. 따라서 본 연구는 IoT 응용프로그램에 대한 유사표절을 데이터 마이닝 기법으로 연구하였으며 이는 프로그램 복제로 인한 창작자의 프로그램을 보호하고 나아가 프로그램으로 인한 개인정보유출과 침해에 대한 방안을 제안하였다.

Keywords

References

  1. C. S. Pyo, H, Y. Yong, N. S. Kim & H. C. Bang. (2013). IoT(M2M) Technology Trends and Prospects. Journal of the Korean Institute of Communication Sciences (Information and Communication), 30(8), 3-10.
  2. J. H. Jeon, H. G. Hong, W. S. Lee & H. J. Kim. (2015). Open Source Things Internet (OSIoT) Trends and Forecasts. Journal of the Korean Institute of Communication Sciences (Information and Communication), 32 (5), 23-30.
  3. H. S. Jang, H. J. Kim, & T. S. Son. (2015). A Study on Cyber Security Issues in Industrial IoT Environment. Journal of Information Security, 25(5), 12-17.
  4. H. M. Lee & D. K. Shin. (2015). Open Software Platform Design for the Internet. Proceedings of the Korea Information Science Society Conference, 1492-1494.
  5. H. K. Lee, M. H. Kim & H. C. Bang. (2014). Feature: Internet: Things Internet technology trends and development direction. Journal of Korea Institute of Information Scientists and Engineers 21-2: 14-21.
  6. Y. G. Hong, M. K Shin & H. J. Kim. (2013). Standardization trend of internet (IoT / M2M). OSIA Standards & Technology Review, 26 (2), 8-17.
  7. D. H. Kim, S. W. Yoon & Y. P. Lee. (2013). Security or IoT services. Journal of the Korean Institute of Communication Sciences (Information and Communication), 30(8), 53-59.
  8. J. H. Seo, Y. S. Min & Y K. Park. (2015). Technical analysis for software protection. Journal of Information Technology, 13(1), 33-39.
  9. S. M. You. (2015). Government Policy Direction for Software Copyright Protection. Journal of Information Technology, 13(1), 41-47.
  10. J. S, Lee, S. K. Chang & I. H. Cho. (2014). Hardware based security for Internet of Things (IoT) security. Proceedings of the Fall Conference of the Korean Society for Internet Information, 241-242.
  11. J. S. Choi & H. W. Kim. (2013). IoT security technology trend.
  12. ITU Internet Reports. (2005). Internet of Things, ITU
  13. ITU-T Y.2060, (2012). Overview of the Internet of Things.
  14. A. Wright. (2009). Cyber security for the power grid: cyber security issues & Securing control systems, ACM CCS.
  15. J. S. Choi & H. W. Kim. (2013). IoT security technology trend. Table 1, 2814
  16. BILL WEINBERG, Open Source and the Internet of Things: Roles, Reach and Rationale for Deploying OSS, http://rtcmagazine.com/articles/view/105734
  17. B. I. Kim. (2009). Open source license violations and copyright infringement. Quarterly copyright.
  18. H. R. Reddy. (2009). Jacobsen v. Katzer: the Federal Circuit weighs in on the enforceability of free and open source software licenses. Berkeley Tech. LJ, 24, 299.
  19. Y. C. Kim, S. C. Hwang & J. Y. Choi. (2005). Program similarity evaluation algorithm." Journal of the Internet Information Science Society. 51-64.
  20. N. J. Park & G. J. Ahn. (2010). Privacy Protection in Smart Grid. Journal of information security, 20(3), 62-78.
  21. H. J. Seo, D. K. Kim, J. H. Kim, J. S. Choi & H. W. Kim. (2014). Feature: Internet of Things: Security and Privacy Protection on the Internet. Journal of Information Processing, 21(2), 48-60.
  22. S. W. Cha. (2014). Big Data Protection of the environment and privacy. IT and Law Studies, 8, 193-259.
  23. Y. S. Son & J. H. Park. (2015). Home IoT technology status and development direction. Journal of the Korean Institute of Communication Sciences (Information and Communication), 32(4), 23-28.
  24. S. H. Lee & Y. Y. Cho. (2015). A Study on the Strengthening of National Cyber Security in the Internet Age. Political Information Research, 18 (2), 1-30.
  25. H. S. Chang, H. J. Kim & T. S. Son. (2015). A Study on Cyber Security Issues in Industrial IoT Environment." Journal of information security 25.5: 12-17.
  26. http://www.ddaily.co.kr/news/article.html?no=137711 Digital Daily, (2016)
  27. Y. L. Lee & J. S. Kim. (2014). Personal Information Protection Framework in IoT Environment. Korea Contents Association 2014 Fall Conference, 277-278.
  28. S. S. Kim. (1996). Introduction to Computer Science, Hongneung Science Publishing.: 183-216.
  29. Oracle America, Inc. v. Google Inc., 2014 WL 1855277 (Fed. Cir. May 9, 2014).
  30. Y. E. Kim, Y. J. Lee & W. G.2013). Program Plagiarism Checking Method by Class Structure Graph Comparison. Journal of the Korea Contents Association, 13 (11), 37-47. https://doi.org/10.5392/JKCA.2013.13.11.037
  31. C. Roy & J. Cordy. (2007). A Survey on Software Clone Detection Research, Technical Report 541, Queen's University at Kingston.
  32. S. Narayanan & S. Simi. (2012). Source Code Plagiarism Detection and Performance Analysis Using Fingerprint Based Distance Measure Method. 2012 7th International Conference on Computer Science & Education, 1065-1068.
  33. J. Ji, G. Woo & H. Cho. (2007). A Source Code Linearization Technique for Detecting Plagiarized Programs. ACM SIGCSE Bulletin 39(3),, 73-77. https://doi.org/10.1145/1269900.1268807
  34. C. Liu, C. Chen, J. Han, & P. Yu, (2006). GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis," Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, .872-881.
  35. S. O. Yoon. (2013). A Study on Risk Classification of Big Data. Journal of the Korean Association of Local Information, 16(2), 93-122.
  36. J. J. Kim. (1997). Computer General, Hong Jin Publishing Co., Ltd pp196
  37. & S.Y. Yuk.(2003) Patentability of computer programs. Comparative Judgment 1.2:481-511.
  38. Supreme Court precedent 1996.08.23, 95DO2785
  39. Supreme Court precedent 2001. 05. 15, 98DO732
  40. Seoul High Court case 1999.04.07, 98. 23616
  41. Seoul case law support for East1998. 4.NA 13. Sentence 96KAHAP 1921 verdict
  42. Seoul case law support for East 1997.11.28, 95GAHAP 11403
  43. Supreme Court precedent 2002.06.28, 2001DO2900
  44. Seoul High Court 1996.10.11, 96NA1353
  45. Supreme Court precedent 2002.12.26, 2000DA.13757
  46. Seoul District Court Copy 1997.01.10. 96NO7508 / Supreme Court 1997.07.22. 97DO764/Supreme Court 1997.05.30. 97DO766 /Supreme Court 1997.05.23. 97DO767 /Supreme Court 1997.06.13. 97DO768 Computer program protection law
  47. Supreme Court precedent 1998.03.13, 97DA45259
  48. Supreme Court precedent 2000.11.10, 98DA60590
  49. Seoul High Court case 1993.06.18, 92NA64646 / Seoul District Court 1993.04.22, 92GAHAP31298
  50. J. Holler, V. Tsiatsis, C. Mulligan, S. Avesand, S. Karnouskos & D. Boyle. (2014). From Machineto- machine to the Internet of Things: Introduction to a New Age of Intelligence. Academic Press.
  51. J. E. Cohen & M. A. Lemley. (2001). Patent scope and innovation in the software industry. California Law Review, 1-57.
  52. T. H. Goo. (2005). Technical Characteristics of Computer Programs and Patent and Copyright Protection. 13.
  53. J. Bessen & E. Maskin. (2009). Sequential innovation, patents, and imitation. The RAND Journal of Economics, 40(4), 611-635. https://doi.org/10.1111/j.1756-2171.2009.00081.x
  54. S. J. Oh & H. W. Lee. (2013). Copyright Law 3rd Edition, Park Young-sa, 873
  55. http://it.donga.com/23161/ITDONGHAS.WLee 2015.12.03.
  56. Y. C. Kim, S. C. Hwang & J. Y. Choi. (2005). Program similarity evaluation algorithm. Journal of the Internet Information Science Society, 6(1), 51-64.
  57. Y. E. Kim, Y. J. Lee & W. G.(2013). Program Plagiarism Checking Method by Class Structure Graph Comparison. Journal of the Korea Contents Association, 13(11), 37-47. https://doi.org/10.5392/JKCA.2013.13.11.037
  58. B. Y. Lee, J. T. Lim & J. S. Yoo. (2013). Utilization of social media analysis technique using big data. Journal of the Korea Contents Association, 13(2), 211-219. https://doi.org/10.5392/JKCA.2013.13.02.211
  59. S. H. Lee & K. W. Shin. (2018). Area-efficient design of SHA-256 hash processors for IoT security. The Journal of the Korea Information and Communications Society, 22(1), 109-116.
  60. H. E. Moon, J. Y, Sung, H. S. Lee, K .I, Jang, K. Y. Kwak & S. T. Woo. (2018). Detection of attack group using malware and packer detection. Journal of the Korean Institute of Information Scientists and Engineers, 45(2), 106-112.
  61. H. S. Yang. (2017). A Study on the Security Quality Evaluation Method of Smart Healthcare System. Digital fusion research, 15(11), 251-259.
  62. Y. C. Ahn, Y. H. Shin, G. H. Lee. (2015). A Study on the countermeasure against BLE based ZEP system attack technique using the fusion of Big Data platform and monitoring system. Digital fusion research, 13(8), 331-336.