000 04190nam a22005055i 4500
001 978-981-15-3654-0
003 DE-He213
005 20210511115654.0
007 cr nn 008mamaa
008 200423s2020 si | s |||| 0|eng d
020 _a9789811536540
_9978-981-15-3654-0
024 7 _a10.1007/978-981-15-3654-0
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity Infrastructure Technology for Integrated Utilization of Big Data
_h[electronic resource] :
_bApplied to the Living Safety and Medical Fields /
_cedited by Atsuko Miyaji, Tomoaki Mimoto.
250 _a1st ed. 2020.
264 1 _aSingapore :
_bSpringer Singapore :
_bImprint: Springer,
_c2020.
300 _aIX, 166 p. 61 illus., 55 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group.
506 0 _aOpen Access
520 _aThis open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.
650 0 _aData protection.
_9210
650 1 4 _aSecurity.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28000
_9215
700 1 _aMiyaji, Atsuko.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_92493
700 1 _aMimoto, Tomoaki.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_92494
710 2 _aSpringerLink (Online service)
_9141
776 0 8 _iPrinted edition:
_z9789811536533
776 0 8 _iPrinted edition:
_z9789811536557
776 0 8 _iPrinted edition:
_z9789811536564
856 4 0 _uhttps://doi.org/10.1007/978-981-15-3654-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-SOB
942 _cEBK
_w1
_xAdministrator Library
_y1
_z Administrator Library
999 _c592
_d592
773 _tSpringer Nature Open Access eBook