Security Infrastructure Technology for Integrated Utilization of Big Data : Applied to the Living Safety and Medical Fields / / edited by Atsuko Miyaji, Tomoaki Mimoto.

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-prese...

Full description

Saved in:
Bibliographic Details
HerausgeberIn:
Place / Publishing House:Singapore : : Springer Singapore :, Imprint: Springer,, 2020.
Year of Publication:2020
Edition:1st ed. 2020.
Language:English
Physical Description:1 online resource (IX, 166 p. 61 illus., 55 illus. in color.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993543648004498
ctrlnum (CKB)4100000011223338
(MiAaPQ)EBC6191379
(DE-He213)978-981-15-3654-0
(Au-PeEL)EBL6191379
(OCoLC)1153062197
(oapen)https://directory.doabooks.org/handle/20.500.12854/33048
(PPN)243760051
(EXLCZ)994100000011223338
collection bib_alma
record_format marc
spelling Miyaji, Atsuko edt
Security Infrastructure Technology for Integrated Utilization of Big Data [electronic resource] : Applied to the Living Safety and Medical Fields / edited by Atsuko Miyaji, Tomoaki Mimoto.
1st ed. 2020.
Singapore Springer Nature 2020
Singapore : Springer Singapore : Imprint: Springer, 2020.
1 online resource (IX, 166 p. 61 illus., 55 illus. in color.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.
Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group.
Description based on publisher supplied metadata and other sources.
English
Data protection.
Security. https://scigraph.springernature.com/ontologies/product-market-codes/I28000
Security
Secure Date Management
Privacy Protection
Big Data Security
Information Security
Cyber Security
Open Access
Computer security
981-15-3653-8
Miyaji, Atsuko. editor. edt http://id.loc.gov/vocabulary/relators/edt
Mimoto, Tomoaki. editor. edt http://id.loc.gov/vocabulary/relators/edt
language English
format Electronic
eBook
author2 Miyaji, Atsuko.
Miyaji, Atsuko.
Mimoto, Tomoaki.
Mimoto, Tomoaki.
author_facet Miyaji, Atsuko.
Miyaji, Atsuko.
Mimoto, Tomoaki.
Mimoto, Tomoaki.
author2_variant a m am
a m am
a m am
t m tm
t m tm
author2_role HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
author_sort Miyaji, Atsuko.
title Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields /
spellingShingle Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields /
Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group.
title_sub Applied to the Living Safety and Medical Fields /
title_full Security Infrastructure Technology for Integrated Utilization of Big Data [electronic resource] : Applied to the Living Safety and Medical Fields / edited by Atsuko Miyaji, Tomoaki Mimoto.
title_fullStr Security Infrastructure Technology for Integrated Utilization of Big Data [electronic resource] : Applied to the Living Safety and Medical Fields / edited by Atsuko Miyaji, Tomoaki Mimoto.
title_full_unstemmed Security Infrastructure Technology for Integrated Utilization of Big Data [electronic resource] : Applied to the Living Safety and Medical Fields / edited by Atsuko Miyaji, Tomoaki Mimoto.
title_auth Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields /
title_new Security Infrastructure Technology for Integrated Utilization of Big Data
title_sort security infrastructure technology for integrated utilization of big data applied to the living safety and medical fields /
publisher Springer Nature
Springer Singapore : Imprint: Springer,
publishDate 2020
physical 1 online resource (IX, 166 p. 61 illus., 55 illus. in color.)
edition 1st ed. 2020.
contents Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group.
isbn 981-15-3654-6
981-15-3653-8
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 1153062197
work_keys_str_mv AT miyajiatsuko securityinfrastructuretechnologyforintegratedutilizationofbigdataappliedtothelivingsafetyandmedicalfields
AT mimototomoaki securityinfrastructuretechnologyforintegratedutilizationofbigdataappliedtothelivingsafetyandmedicalfields
status_str n
ids_txt_mv (CKB)4100000011223338
(MiAaPQ)EBC6191379
(DE-He213)978-981-15-3654-0
(Au-PeEL)EBL6191379
(OCoLC)1153062197
(oapen)https://directory.doabooks.org/handle/20.500.12854/33048
(PPN)243760051
(EXLCZ)994100000011223338
carrierType_str_mv cr
is_hierarchy_title Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields /
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1796649061897469952
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03913nam a22004455i 4500</leader><controlfield tag="001">993543648004498</controlfield><controlfield tag="005">20230125190136.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr nn 008mamaa</controlfield><controlfield tag="008">200423s2020 si | o |||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">981-15-3654-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-15-3654-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000011223338</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC6191379</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)978-981-15-3654-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6191379</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1153062197</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/33048</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)243760051</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000011223338</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">thema</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Miyaji, Atsuko</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security Infrastructure Technology for Integrated Utilization of Big Data</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">Applied to the Living Safety and Medical Fields /</subfield><subfield code="c">edited by Atsuko Miyaji, Tomoaki Mimoto.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2020.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore :</subfield><subfield code="b">Springer Singapore :</subfield><subfield code="b">Imprint: Springer,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (IX, 166 p. 61 illus., 55 illus. in color.) </subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- Cryptography Core Technology -- Secure Primitive for big data utilization -- Secure Data Management Technology -- Living Safety Testbed Group -- Health Test Bed Group.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="650" ind1="1" ind2="4"><subfield code="a">Security.</subfield><subfield code="0">https://scigraph.springernature.com/ontologies/product-market-codes/I28000</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Secure Date Management</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Privacy Protection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Big Data Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Open Access</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">981-15-3653-8</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miyaji, Atsuko.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mimoto, Tomoaki.</subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-06-01 23:13:14 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2020-05-23 22:10:14 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337456940004498&amp;Force_direct=true</subfield><subfield code="Z">5337456940004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337456940004498</subfield></datafield></record></collection>