Security Infrastructure Technology for Integrated Utilization of Big Data

Security Infrastructure Technology for Integrated Utilization of Big Data
Author :
Publisher : Springer Nature
Total Pages : 171
Release :
ISBN-10 : 9789811536540
ISBN-13 : 9811536546
Rating : 4/5 (546 Downloads)

Book Synopsis Security Infrastructure Technology for Integrated Utilization of Big Data by : Atsuko Miyaji

Download or read book Security Infrastructure Technology for Integrated Utilization of Big Data written by Atsuko Miyaji and published by Springer Nature. This book was released on 2020-04-23 with total page 171 pages. Available in PDF, EPUB and Kindle. Book excerpt: This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.


Security Infrastructure Technology for Integrated Utilization of Big Data Related Books

Security Infrastructure Technology for Integrated Utilization of Big Data
Language: en
Pages: 171
Authors: Atsuko Miyaji
Categories: Computers
Type: BOOK - Published: 2020-04-23 - Publisher: Springer Nature

DOWNLOAD EBOOK

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and us
Security Infrastructure Technology for Integrated Utilization of Big Data
Language: en
Pages:
Authors: Atsuko Miyaji
Categories: Data protection
Type: BOOK - Published: 2020 - Publisher:

DOWNLOAD EBOOK

Security Infrastructure Technology for Integrated Utilization of Big Data
Language: en
Pages: 170
Authors: Atsuko Miyaji
Categories: Computers
Type: BOOK - Published: 2020-10-09 - Publisher:

DOWNLOAD EBOOK

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and us
Handbook of Research on Advancing Cybersecurity for Digital Transformation
Language: en
Pages: 460
Authors: Sandhu, Kamaljeet
Categories: Computers
Type: BOOK - Published: 2021-06-18 - Publisher: IGI Global

DOWNLOAD EBOOK

Cybersecurity has been gaining serious attention and recently has become an important topic of concern for organizations, government institutions, and largely f
Information Security and Privacy
Language: en
Pages: 509
Authors: Ernest Foo
Categories: Computers
Type: BOOK - Published: 2015-06-24 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane,