Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Donghyeok Lee is active.

Publication


Featured researches published by Donghyeok Lee.


The Journal of Supercomputing | 2017

Erratum to: Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance

Donghyeok Lee; Namje Park

A number of recent maritime accidents strongly imply the need of distributed smart surveillance. The maritime cloud, proposed as communications infrastructure of e-Navigation, is one of the most optimal infrastructure systems in the smart surveillance environment. To maintain the safe maritime environment, security in the distributed smart surveillance environment is critical, but research on security of the maritime cloud, which will be adopted as major communications infrastructure in the smart surveillance system, is still in the fledging stage. In this regard, this paper suggested a safe synchronization method of Almanac, which is necessary to provide unimpeded maritime cloud service. Almanac plays a role of a telephone directory and it should be shared in the latest version in communicating between vessels or a vessel and land. In other words, synchronization of Almanac between offshore and vessels is required to safely deliver major video information collected by the distributed smart camera. The method proposed in this paper enables geocasting based synchronization between vessels, which is suitable for maritime conditions, and does not expose information in the course of synchronization even in the case of broadcasting through an unsafe channel. In addition, the method ensures integrity based on block ID and supports delta update, thereby minimizing bandwidth and boosting performance.


Personal and Ubiquitous Computing | 2018

Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment

Namje Park; Donghyeok Lee

Electronic identity card information in online sensor network environment is closely related to privacy issues because of their characteristics, and this should be widely considered as an issue related to personal privacy rather than simply from the viewpoint of security. Even if system security has been established, if personal privacy is infringed, most people will not use electronic identification (eID) cards. In the present paper, a method of reinforcing personal information protection for eID cards was considered. As a major solution, the problem was approached from the viewpoint of not storing any personal information per se in eID cards using the secret sharing technique, and a structure in which no information whatsoever on the original can be known from only the secret share in the card was proposed. With these characteristics, the proposed scheme ensures safety even when eID cards have been lost, as well as against power analysis attacks, client masquerading, skimming, and sniffing.


Peer-to-peer Networking and Applications | 2018

De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment

Donghyeok Lee; Namje Park; Geon-Woo Kim; Seung-Hun Jin

Various security threats exist in the smart grid environment due to the fact that information and communication technology are grafted onto an existing power grid. In particular, smart metering data exposes a variety of information such as users’ life patterns and devices in use, and thereby serious infringement on personal information may occur. Therefore, we are in a situation where a de-identification algorithm suitable for metering data is required. Hence, this paper proposes a new de-identification method for metering data. The proposed method processes time information and numerical information as de-identification data, respectively, so that pattern information cannot be analyzed by the data. In addition, such a method has an advantage that a query such as a direct range search and aggregation processing in a database can be performed even in a de-identified state for statistical processing and availability.


International Conference on Frontier Computing | 2017

Secure Cyber Physical System R&D Project Issue in Korea

Donghyeok Lee; Won-chi Jung; Namje Park

In this secure smart grid R&D project issue in Korea, we aimed to develop the smart grid security technology which is the type of support of security vulnerability analysis through the convergence of IT technology. In addition, through securing such cutting edge technologies as smart meter monitoring, vulnerability analysis modeling, privacy mining, light-type mutual authentication service mechanism, and contents-based approach controls, we are going to pursue our research and development activities to make the core technology suitable for domestic environments, and also plan to have these technologies used by the industries by transferring the technology in a timely manner.


workshop on information security applications | 2016

Geocasting-Based Almanac Synchronization Method for Secure Maritime Cloud

Donghyeok Lee; Namje Park

A number of recent maritime accidents strongly imply the need of distributed smart surveillance. The maritime cloud, proposed as communications infrastructure of e-Navigation, is one of the most optimal infrastructure systems in the smart surveillance environment. To maintain the safe maritime environment, security in the distributed smart surveillance environment is critical, but research on security of the maritime cloud, which will be adopted as major communications infrastructure in the smart surveillance system, is still in the fledging stage. In this regard, this paper suggested a safe synchronization method of Almanac, which is necessary to provide unimpeded maritime cloud service. Almanac plays a role of a telephone directory and it should be shared in the latest version in communicating between vessels or a vessel and land. In other words, synchronization of Almanac between offshore and vessels is required to safely deliver major video information collected by the distributed smart camera. The method proposed in this paper enables geocasting based synchronization between vessels, which is suitable for maritime conditions, and does not expose information in the course of synchronization even in the case of broadcasting through an unsafe channel. In addition, the method ensures integrity based on block ID and supports delta update, thereby minimizing bandwidth and boosting performance.


information security and cryptology | 2016

Teaching Book and Tools of Elementary Network Security Learning using Gamification Mechanism

Donghyeok Lee; Namje Park

This paper is directed for the information security education of the elementary students. The dependence on human involvement and human behavior to protect information assets necessitates an information security education to make the awareness of their roles and responsibilities towards information security. The information security education is needed even to elementary school students. The information security learning model integrating knowledge, attitudes, and ways to practice was developed, and the teaching plan and learning material hand-out were accordingly made out. As the test result analysis, it was verified that the developed teaching tools of elementary network security learning using gamification mechanism was effective to help the students learn the knowledge, attitudes, skills and ways to practice.


information security and cryptology | 2016

Legislative Reform of Smart Grid Privacy Act

Donghyeok Lee; Namje Park

Smart grid systems can be real-time information exchange between suppliers and consumers, and provides a lot of convenience. However, the risk to the users personal information exposure is ever-present. Depending on the characteristic of the smart grid environment, there is a threat of the disclosure of personal information based on the personal information life-cycle, and can also be exposed a variety of information based on energy consumption pattern analysis. In this paper, we analyze the existing privacy act in the smart grid and propose improvements for the existing directive.


Asia-pacific Journal of Multimedia services convergent with Art, Humanities, and Sociology | 2016

Smart Grid Privacy Protection Measures According to the Change of IT Paradigm

Donghyeok Lee; Namje Park

In recent years, IT paradigm is changing and the smart grid environment has evolved. Smart grid system brings convenience, at the same time, there is also always the threat of privacy. Privacy threats Received (January 15, 2016), Review Result (January 29, 2016) Accepted (February 5, 2016), Published (March 31, 2016) 632-94 Jeju National University Elementary Education Research Institute, Jeju National University, 61 Iljudong-ro, Jeju-si, Jeju-do, Korea email: [email protected] 632-94 Major in Computer Education, Faculty of Science Education, Graduate School, Jeju National Univ., 61 Iljudong-ro, Jeju-si, Jeju-do, Korea (Corresponding Author) Department of Computer Education, Teachers College, Jeju National University, 61 Iljudong-ro, Jeju-si, Jeju-do, Korea email: [email protected] * 이 논문은 2013년도 정부(교육부)의 재원으로 한국연구재단의 기초연구사업 지원을 받아 수행된 것임(과제 번호:2013R1A1A4A01013587) Smart Grid Privacy Protection Measures According to the Change of IT Paradigm Copyright c 2016 HSST 82 must be considered in various ways. Therefore, this paper examines the privacy threats from emerging Smart grid environment in two terms of mobile and cloud. And it presents the preperation plan to threats. In this paper, the main requirements for each telecommunicational environment of smart grid were examined, precedent studies were analyzed, and the kinds of security service to meet these requirements and to offer high quality of security of information was analyzed. And then, based on the defined research framework, the types of abuse of personal information and the consideration for privacy and information protection and the methods to protect them were studied. Grounded on this research, more systematic study on the security technology of smart grid was to be conducted.


information security and cryptology | 2016

A Proposal of SH-Tree Based Data Synchronization Method for Secure Maritime Cloud

Donghyeok Lee; Namje Park


The Journal of Korean Institute of Information Technology | 2018

A Proposal of Privacy-Enhanced Deduplication Technique in a Cloud Environment

Donghyeok Lee; Namje Park

Collaboration


Dive into the Donghyeok Lee's collaboration.

Top Co-Authors

Avatar

Namje Park

Jeju National University

View shared research outputs
Top Co-Authors

Avatar

Geon-Woo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Seung-Hun Jin

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge