학술논문
빅데이터 생명주기를 고려한 개인정보보호 수준 평가항목 개발 / Development of Personal Information Protection Level Evaluation Items Considering Big Data Life Cycle
Document Type
Dissertation/ Thesis
Author
Source
Subject
Language
Korean
Abstract
인터넷, 소셜 미디어와 같은 서비스 확산과 개인 스마트 기기의 발전에 따라 데이터양이 기하급수적으로 증가하고 있다. 기존의 데이터 분석 및 지원 기술로는 감당하기 어려울 정도 이며, 빅데이터의 활용은 가까운 미래를 예측하거나 조직의 가치를 현실화함으로써 미래의 경쟁력으로 인식하게 되었다. 하지만, 빅데이터 환경에서 프라이버시 침해가 제기됨에 따라 이에 대응하기 위한 방안이 요구되며, 현존하는 개인정보 보호 평가항목과 달리 빅데이터의 환경에서 적용할 수 있는 평가항목이 요구된다. 왜냐하면 1) 빅데이터 환경에서는 대용량 데이터 확보를 위하여 고도화된 정보 수집 기술로 주체자의 동의 없이 정보를 가공하여 무분별하게 활용, 2) 접속채널의 다양화로 인하여 무분별한 접근 및 열람, 3) 산발적으로 관리되는 분산시스템의 특성에 따라 개인정보의 완전한 폐기가 어렵다는 문제점이 있기 때문이다. 따라서 본 논문은 다음과 같은 단계로 구성하여 빅데이터 생명주기를 기반으로 한 개인정보 보호 수준 평가항목을 제안하였다. 세부적인 절차는 1) 빅데이터 처리 프로세스 별 관련 기술을 파악, 2) 빅데이터 관련 개인정보 침해 사례를 통하여 빅데이터 환경에서 개인정보보호의 필요성 제기, 3) 현존하는 개인정보 보호 체계에서 향후 필요한 개인정보 보호 기술에 대한 방향성 제시하였다. 이를 통하여 빅데이터 생명주기를 기반으로 한 평가항목의 타당성을 검토하였다. 비록, 평가항목을 실무에 적용하지 않아 본 논문에서 제안한 평가항목의 실제 효과를 규명하지 못하였지만, 기존의 개인정보보호 평가항목과 다른 빅데이터 환경에서 요구하는 기술에 대하여 이론적인 고찰을 수행하였음에 의의가 있다. 실제로 ‘빅데이터 활용’과 ‘개인정보 보호’의 영역의 균형을 맞추기란 어려운 일이다. 하지만, 조직은 빅데이터 생명주기별 개인정보의 침해 위협 자체를 간과하여서는 안 되며, 빅데이터 환경과 개인정보 침해 위협의 연계성을 고려하여야 한다. 이에 따라 본 논문의 평가항목을 활용하여 조직이 보다 더 안전한 빅데이터를 활용하는데 기여하는 바이다.
With the proliferation of services such as the Internet and social media and the development of personal smart devices, the amount of data is increasing exponentially. It is difficult to cope with existing data analysis and support technology. The use of big data has been recognized as future competitiveness by forecasting the near future or realizing organizational value.However, as privacy violation is raised in big data environment, measures are needed to cope with it. Unlike existing privacy protection evaluation items, evaluation items that can be applied in big data environment are required. Because 1) In the big data environment, the information is collected and processed without the consent of the subject with advanced information gathering technology for securing large capacity data, 2) indiscreet access and browsing due to diversification of access channels, and 3) sporadically managed This is because it is difficult to completely discard personal information according to the characteristics of the distributed system.Therefore, this paper proposes the evaluation items of personal information protection level based on the big data life cycle. The detailed procedures are as follows: 1) to grasp relevant technology for each big data processing process, 2) to raise the necessity of protecting personal information in big data environment through case of infringement of big data related personal information, 3) The direction of information security technology was suggested. This study examined the validity of the evaluation items based on the Big Data Life Cycle.Although we did not find out the actual effect of the evaluation items proposed in this paper because the evaluation items were not applied in practice, It is meaningful that we conducted theoretical studies on the technologies required in the big data environment and other existing personal information protection evaluation items.In fact, it is difficult to balance the "big data leverage" and "privacy" areas. However, the organization should not overlook the threat of personal data infringement by the big data life cycle, and should take into account the link between the big data environment and the threat of personal information infringement. Therefore, we utilize the evaluation items of this paper to help organizations utilize more secure big.
With the proliferation of services such as the Internet and social media and the development of personal smart devices, the amount of data is increasing exponentially. It is difficult to cope with existing data analysis and support technology. The use of big data has been recognized as future competitiveness by forecasting the near future or realizing organizational value.However, as privacy violation is raised in big data environment, measures are needed to cope with it. Unlike existing privacy protection evaluation items, evaluation items that can be applied in big data environment are required. Because 1) In the big data environment, the information is collected and processed without the consent of the subject with advanced information gathering technology for securing large capacity data, 2) indiscreet access and browsing due to diversification of access channels, and 3) sporadically managed This is because it is difficult to completely discard personal information according to the characteristics of the distributed system.Therefore, this paper proposes the evaluation items of personal information protection level based on the big data life cycle. The detailed procedures are as follows: 1) to grasp relevant technology for each big data processing process, 2) to raise the necessity of protecting personal information in big data environment through case of infringement of big data related personal information, 3) The direction of information security technology was suggested. This study examined the validity of the evaluation items based on the Big Data Life Cycle.Although we did not find out the actual effect of the evaluation items proposed in this paper because the evaluation items were not applied in practice, It is meaningful that we conducted theoretical studies on the technologies required in the big data environment and other existing personal information protection evaluation items.In fact, it is difficult to balance the "big data leverage" and "privacy" areas. However, the organization should not overlook the threat of personal data infringement by the big data life cycle, and should take into account the link between the big data environment and the threat of personal information infringement. Therefore, we utilize the evaluation items of this paper to help organizations utilize more secure big.