• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ¹öŶ°ú ºí·ëÇÊÅ͸¦ È¥ÇÕÇÑ ¹Î°¨ÇÑ µ¥ÀÌÅÍ º¸¾È
¿µ¹®Á¦¸ñ(English Title) The Secure Algorithm on the Sensitive data using Bloom filter and bucket method
ÀúÀÚ(Author) À¯Ãµ¿µ   ±èÁöÈ«   Choun-young Yu   Ji-hong Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 16 NO. 05 PP. 0939 ~ 0946 (2012. 05)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù °³ÀÎÁ¤º¸ À¯Ãâ »ç°Ç°ú °ü·ÃµÈ »ç°í°¡ »çȸÀû À̽´°¡ µÇ°í ÀÖ´Ù. ¹Î°¨ÇÑ °³ÀÎÁ¤º¸¸¦ ¾ÏȣȭÇÏ¿© µ¥ÀÌÅ͸¦ º¸È£ÇÑ´Ù¸é Á¤º¸ À¯ÃâÀÌ È®½ÇÈ÷ ÁÙ¾îµé °ÍÀÌ´Ù. º» ³í¹®¿¡¼­´Â µ¥ÀÌÅÍ º¸È£¸¦ À§ÇÑ ±âÁ¸ÀÇ ¿¬±¸ ¹æ¹ýÀ» ºÐ¼®ÇÏ°í, ºí·ëÇÊÅÍ ¹æ½Ä¿¡ ¹öŶÀ» È¥ÇÕÇÑ º¹ÇÕÀûÀÎ ¹æ¹ýÀ¸·Î ¹Î°¨ÇÑ Á¤º¸¸¦ ¾ÏȣȭÇϱâ À§ÇÏ¿© Á¦¾ÈÇÏ¿´´Ù. °¡Àå ¸¹ÀÌ »ç¿ëµÇ´Â Æ©Çà ¾Ïȣȭ ¹æ½Ä¿¡ ¹öŶÀ妽º ¹æ½ÄÀ» Àû¿ëÇÑ ¹æ½ÄÀÌ´Ù. ÀÌ ¹æ½ÄÀº ¹öŶÁ¤º¸·Î ÀÎÇÏ¿© µ¥ÀÌÅÍÀÇ ºÐÆ÷°¡ ³ëÃâµÈ´Ù´Â ´ÜÁ¡À» °¡Áø´Ù. ÀÌ·¯ÇÑ ¹öŶÀ妽º ¹æ½ÄÀÇ µ¥ÀÌÅÍ ³ëÃâ Ư¼ºÀ» ¹æÁöÇϱâ À§ÇÏ¿©, º» ³í¹®¿¡¼­´Â ¹öŶÀ妽º¿Í ºí·ëÇÊÅ͸¦ Àû¿ëÇÑ º¹ÇÕÀûÀÎ ¾Ïȣȭ¹æ½ÄÀ» Á¦¾ÈÇÑ´Ù. Á¦¾ÈµÈ ¹æ½ÄÀÇ Æ¯Â¡Àº µ¥ÀÌÅÍÀÇ ³ëÃâÀ» ¹æÁöÇÒ »Ó ¾Æ´Ï¶ó µ¥ÀÌÅͺ£À̽ºÀÇ °Ë»ö¼º´ÉÀ» Çâ»ó½ÃŲ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Recently privacy breaches has been an social issues. If we should encrypt the sensitive information in order to protect the database, the leakage of the personal sensitive data will be reduced for sure. In this paper, we analyzed the existing protection algorithms to protect the personal sensitive data and proposed the combined method using the bucket index method and the bloom filters. Bucket index method applied on tuples data encryption method is the most widely used algorithm. But this method has the disadvantages of the data exposure because of the bucket index value presented. So we proposed the combined data encryption method using bucket index and the bloom filter. Features of the proposed scheme are the improved search performance of data as well as the protection of the data exposure.
Å°¿öµå(Keyword) µ¥ÀÌÅͺ£À̽º   ¾Ïȣȭ   º¹È£È­   ±àÁ¤¿À·ù   database   encrypt   decrypt   false positive  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå