DOI QR코드

DOI QR Code

Real Time User Location Information Protection Model Using Anonymity

익명성을 활용한 사용자의 실시간 위치정보 보호모델

  • Mun, Hyung-Jin (College of Electrical & Computer Engineering, Chungbuk National University)
  • Received : 2013.08.09
  • Accepted : 2013.09.17
  • Published : 2013.10.31

Abstract

Due to the development of ICT, with using hardwares such as WiFi, 3G and GPS and so on, smartphone could have provided a lot of applications with novel functions rapidly. Through such applications, lots of personal information such as personal location, personal images, and list of phone calls is created, saved and widely used. Because there is lots of leakage of the stored personal information due to loss of phone and application, privacy violation have been important issue nowadays. Smartphone with GPS and Internet provides location information. To protect the information, the technologies that only the authorized user can access it while inquiring the location information have been proposed. In this paper, to minimize the identification information for location information subject and information user and anonymize the identifiable information such as phone number, we proposed a model that can reduce the leakage of information and avoid the wrong usage of the stored information in the server. This technique will be used for protecting privacy when developing the application that provides routing service through location history information.

ICT 발달로 인해 스마트폰이 WiFi, GPS, 3G 등 다양한 하드웨어가 추가되면서 새로운 기능을 제공하는 어플리케이션이 급격하게 개발되고 있다. 어플리케이션을 통해 개인 사진, 전화번호, 통화목록, 위치정보 등의 다양한 개인정보들이 생성되고, 저장되고, 활용되고 있다. 스마트폰에 저장된 개인정보가 폰 분실이나 어플리케이션에 의한 유출사례로 인해 프라이버시 침해가 심각하다. 스마트폰의 GPS와 인터넷이 결합된 위치정보 서비스는 다양하게 제공되고 있다. 위치정보유출로 인한 피해가 심각해지면서 허가된 사용자만이 접근할 수 있는 기술들이 제안되고 있다. 본 논문에서는 위치정보주체와 정보사용자의 식별정보를 최소화하고, 식별이 가능한 핸드폰 번호와 같은 정보는 익명화 처리를 하므로 써 개인정보노출의 피해를 줄이고, 위치정보를 저장한 서버에서의 오남용을 막을 수 있는 모델을 제안하였다. 제안모델을 적용하면 프라이버시를 보호하면서 위치이력정보를 통한 이동경로서비스를 제공하는 어플리케이션 개발이 가능하다.

Keywords

References

  1. PewInternet. Smartphone Ownership 2013 [Internet]. Available:http://pewinternet.org/Reports/2013/smartphoneownership- 2013/Findings.aspx
  2. Gartner. November Report(2013) [Internet]. Available: http://www.gartner.com/newsroom/id/2335616.
  3. Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W.Freeh, "Taming Information-Stealing Smartphone Application (on Android)," in Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST 2011), Pittsburgh, PA, pp.93-107, 2011.
  4. Seokhoon Ko, "A Trend of Android Platform," The Korea Contents Association Review, vol. 8, no. 2, pp.45-49, Jun. 2010.
  5. Shane Conder and Lauren Darcey, "Android Wireless Application Development," in Addison-Wesley Professional, 2nd ed. Pearson Education, pp. 54-138, 2010.
  6. Google. Android Market [Internet]. Available: https://market.android.com/
  7. Wo-jun Jang, Hyong-Woo Lee. "Development of Secure Access Control System for Location Information on Smart Phone", Journal of the Korea Institute of Information Security and Cryptology ,Vol. 21, no. 2, pp.139-147, Apr.2011.
  8. In-jai Kim, Jae-won Choi, Woon-Yoeng Kim, "The Application for the Protection System of Location-based Information on a Smart-phone Environment," The Journal of Society for e-Business Studies, vol.17, no.3, pp.129-147; Aug. 2012.
  9. KISA. The Analysis on the Research of Practical Use of Location Information[Internet]. Available: http://www.kisa.or.kr/public/library/reportView.jsp?regno=011546
  10. HyonJun Bea," Google Android programming: application Structure Analysis," Maso Interactive, pp.236-242, 2008.
  11. Hyung-Jin Mun , "Research for Reverse Engineering about Android APP," In Proceeding of the IT Convergence Society for SMB, Korea, pp87-90, 2012.