Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields / / edited by Atsuko Miyaji, Tomoaki Mimoto.
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-prese...
Saved in:
HerausgeberIn: | |
---|---|
Place / Publishing House: | Singapore : : Springer Singapore :, Imprint: Springer,, 2020. |
Year of Publication: | 2020 |
Edition: | 1st ed. 2020. |
Language: | English |
Physical Description: | 1 online resource (IX, 166 p. 61 illus., 55 illus. in color.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993543648004498 |
---|---|
ctrlnum |
(CKB)4100000011223338 (MiAaPQ)EBC6191379 (DE-He213)978-981-15-3654-0 (Au-PeEL)EBL6191379 (OCoLC)1153062197 (oapen)https://directory.doabooks.org/handle/20.500.12854/33048 (PPN)243760051 (EXLCZ)994100000011223338 |
collection |
bib_alma |
record_format |
marc |
spelling |
Miyaji, Atsuko edt Security Infrastructure Technology for Integrated Utilization of Big Data [electronic resource] : Applied to the Living Safety and Medical Fields / edited by Atsuko Miyaji, Tomoaki Mimoto. 1st ed. 2020. Singapore Springer Nature 2020 Singapore : Springer Singapore : Imprint: Springer, 2020. 1 online resource (IX, 166 p. 61 illus., 55 illus. in color.) text txt rdacontent computer c rdamedia online resource cr rdacarrier This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations. Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group. Description based on publisher supplied metadata and other sources. English Data protection. Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000 Security Secure Date Management Privacy Protection Big Data Security Information Security Cyber Security Open Access Computer security 981-15-3653-8 Miyaji, Atsuko. editor. edt http://id.loc.gov/vocabulary/relators/edt Mimoto, Tomoaki. editor. edt http://id.loc.gov/vocabulary/relators/edt |
language |
English |
format |
Electronic eBook |
author2 |
Miyaji, Atsuko. Miyaji, Atsuko. Mimoto, Tomoaki. Mimoto, Tomoaki. |
author_facet |
Miyaji, Atsuko. Miyaji, Atsuko. Mimoto, Tomoaki. Mimoto, Tomoaki. |
author2_variant |
a m am a m am a m am t m tm t m tm |
author2_role |
HerausgeberIn HerausgeberIn HerausgeberIn HerausgeberIn |
author_sort |
Miyaji, Atsuko. |
title |
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields / |
spellingShingle |
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields / Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group. |
title_sub |
Applied to the Living Safety and Medical Fields / |
title_full |
Security Infrastructure Technology for Integrated Utilization of Big Data [electronic resource] : Applied to the Living Safety and Medical Fields / edited by Atsuko Miyaji, Tomoaki Mimoto. |
title_fullStr |
Security Infrastructure Technology for Integrated Utilization of Big Data [electronic resource] : Applied to the Living Safety and Medical Fields / edited by Atsuko Miyaji, Tomoaki Mimoto. |
title_full_unstemmed |
Security Infrastructure Technology for Integrated Utilization of Big Data [electronic resource] : Applied to the Living Safety and Medical Fields / edited by Atsuko Miyaji, Tomoaki Mimoto. |
title_auth |
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields / |
title_new |
Security Infrastructure Technology for Integrated Utilization of Big Data |
title_sort |
security infrastructure technology for integrated utilization of big data applied to the living safety and medical fields / |
publisher |
Springer Nature Springer Singapore : Imprint: Springer, |
publishDate |
2020 |
physical |
1 online resource (IX, 166 p. 61 illus., 55 illus. in color.) |
edition |
1st ed. 2020. |
contents |
Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group. |
isbn |
981-15-3654-6 981-15-3653-8 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
1153062197 |
work_keys_str_mv |
AT miyajiatsuko securityinfrastructuretechnologyforintegratedutilizationofbigdataappliedtothelivingsafetyandmedicalfields AT mimototomoaki securityinfrastructuretechnologyforintegratedutilizationofbigdataappliedtothelivingsafetyandmedicalfields |
status_str |
n |
ids_txt_mv |
(CKB)4100000011223338 (MiAaPQ)EBC6191379 (DE-He213)978-981-15-3654-0 (Au-PeEL)EBL6191379 (OCoLC)1153062197 (oapen)https://directory.doabooks.org/handle/20.500.12854/33048 (PPN)243760051 (EXLCZ)994100000011223338 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields / |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1796649061897469952 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03913nam a22004455i 4500</leader><controlfield tag="001">993543648004498</controlfield><controlfield tag="005">20230125190136.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr nn 008mamaa</controlfield><controlfield tag="008">200423s2020 si | o |||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">981-15-3654-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-15-3654-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000011223338</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6191379</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)978-981-15-3654-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6191379</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1153062197</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/33048</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)243760051</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000011223338</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">thema</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Miyaji, Atsuko</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security Infrastructure Technology for Integrated Utilization of Big Data</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">Applied to the Living Safety and Medical Fields /</subfield><subfield code="c">edited by Atsuko Miyaji, Tomoaki Mimoto.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2020.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer Singapore :</subfield><subfield code="b">Imprint: Springer,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (IX, 166 p. 61 illus., 55 illus. in color.) </subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="650" ind1="1" ind2="4"><subfield code="a">Security.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I28000</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Secure Date Management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Privacy Protection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Big Data Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Open Access</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">981-15-3653-8</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miyaji, Atsuko.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mimoto, Tomoaki.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-06-01 23:13:14 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2020-05-23 22:10:14 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337456940004498&Force_direct=true</subfield><subfield code="Z">5337456940004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337456940004498</subfield></datafield></record></collection> |