Skip to main content

Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student’s Harmful Contents

  • Conference paper
Information Technology Convergence, Secure and Trust Computing, and Data Management

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 180))

Abstract

In personalized RFID environments, we should consider about privacy, especially damages for contacting offensive contents. Currently, teenagers and even elementary school students below the age of 10 are using cell phones which are in reality ubiquitous information terminals when in fact they ought to be private devices. As such, they can access harmful contents to minors very easily. Therefore, a strict and elaborate mechanism for adult verification should be provided to protect young people from harmful contents. Despite the above countermeasure, if mobile terminals as RFID readers access harmful contents and read them, all related data such as accessing time or contents’ title should be analyzed afterward for checking whether they used for accessing harmful contents or not. Since those data can be deleted by user, general analyzing methods are not useful. So, we use a forensic approach for customizing them to analyze easily. Target media such as hard disks containing related data are copied and analysts use this copy for examining related data. All related data including deleted data can be analyzed using various analysis techniques.

This work was supported by the Korea Foundation for the Advancement of Science & Creativity(KOFAC) grant funded by the Korean Government(MEST).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Park, N.: Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010, Part II. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  3. Park, N.: Secure UHF/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: Jędrzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol. 6922, pp. 488–496. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  4. Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)

    Article  Google Scholar 

  5. Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Park, N., Song, Y.: AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Park, N.: Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., Ślęzak, D. (eds.) ICHIT 2011. CCIS, vol. 206, pp. 467–474. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  8. Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. Studies in Computational Intelligence, vol. 381, pp. 319–327. Springer, Heidelberg (2011)

    Google Scholar 

  9. Kim, Y.: Harmful-word Dictionary DB based Text Classification for Improving Performances of Precesion and Recall. Sungkyunkwan University, Ph.D. Thesis (2009)

    Google Scholar 

  10. Kim, Y., Park, N., Hong, D.: Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits. In: Lee, R. (ed.) Computers, Networks, Systems, and Industrial Engineering 2011. SCI, vol. 365, pp. 201–208. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Kim, Y., Park, N., Won, D.: Privacy-Enhanced Adult Certification Method for Multimedia Contents on Mobile RFID Environments. In: Proc. of IEEE International Symposium on Consumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007)

    Chapter  Google Scholar 

  12. Kim, Y., Park, N., Hong, D., Won, D.: Adult Certification System on Mobile RFID Service Environments. Journal of Korea Contents Association 9(1), 131–138 (2009)

    Article  Google Scholar 

  13. Choi, W., et al.: An RFID Tag Using a Planar Inverted-F Antenna Capable of Being Stuck to Metallic Objects. ETRI Journal 28(2), 216–218 (2006)

    Article  Google Scholar 

  14. Needham, R.M., Schroeder, M.D.: Authentication Revisited. Operating System Review 21(1) (1987)

    Google Scholar 

  15. MRF Forum: Application Data Format for Mobile RFID Services. MRFS-3-02 (2005)

    Google Scholar 

  16. Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  17. Park, N.: The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society 35(5), 785–793 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Youngsoo Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Kim, Y., Park, N. (2012). Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student’s Harmful Contents. In: Park, J., Kim, J., Zou, D., Lee, Y. (eds) Information Technology Convergence, Secure and Trust Computing, and Data Management. Lecture Notes in Electrical Engineering, vol 180. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5083-8_31

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5083-8_31

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5082-1

  • Online ISBN: 978-94-007-5083-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics