000 04080nam a22004935i 4500
001 978-981-15-3654-0
003 DE-He213
005 20200809191634.0
007 cr nn 008mamaa
008 200423s2020 si | s |||| 0|eng d
020 _a9789811536540
_9978-981-15-3654-0
024 7 _a10.1007/978-981-15-3654-0
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity Infrastructure Technology for Integrated Utilization of Big Data
_h[electronic resource] :
_bApplied to the Living Safety and Medical Fields /
_cedited by Atsuko Miyaji, Tomoaki Mimoto.
250 _a1st ed. 2020.
264 1 _aSingapore :
_bSpringer Singapore :
_bImprint: Springer,
_c2020.
300 _aIX, 166 p. 61 illus., 55 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group.
506 0 _aOpen Access
520 _aThis open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don't include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.
650 0 _aData protection.
650 1 4 _aSecurity.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28000
700 1 _aMiyaji, Atsuko.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMimoto, Tomoaki.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811536533
776 0 8 _iPrinted edition:
_z9789811536557
776 0 8 _iPrinted edition:
_z9789811536564
856 4 0 _uhttps://doi.org/10.1007/978-981-15-3654-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-SOB
999 _c82809
_d82808