Advertisement

Cryptographic Technology for Benefiting from Big Data

  • Keisuke Hakuta
  • Hisayoshi Sato
Conference paper
Part of the Mathematics for Industry book series (MFI, volume 1)

Abstract

“Big Data” technology is the process of collecting and storing large amounts and wide varieties of data sets, and extracting valuable information and/or knowledge by analyzing them. Big Data analytics plays an important role in improving business services and quality of life. However, Big Data might include personal information such as credit card data, health-related data, purchasing history, geographic location data, etc. In Big Data analytics, the data sets may be accessed not only by the data holders but also by the third parties. This indicates a potential privacy breach. In addition, when public cloud is used as a platform of Big Data analytics, the risk of privacy breach might further increase. To protect against such threats, it is desirable to develop encryption schemes which are as efficient as possible and encryption schemes which allow to perform computations on encrypted data without decrypting it. In this paper, we present some of the latest results of our research related to the above challenge for Big Data security and privacy.

Keywords

Big data Cloud computing Security Privacy  Cryptography Anonymization 

Notes

Acknowledgments

The authors would like to thank the anonymous reviewers for their careful reading of our manuscript and their many constructive comments and suggestions to improve the quality of the paper. A part of this work has been supported by Ministry of Internal Affairs and Communications of the Japanese Government.

References

  1. 1.
    Cloud Security Alliance (CSA).: Security guidance for critical areas of focus in cloud computing V3.0. https://downloads.cloudsecurityalliance.org/initiatives/guidance/csaguide.v3.0.pdf. Cited 22 Mar 2014
  2. 2.
    Cloud Security Alliance (CSA).: Top threats to cloud computing v1.0. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf. Cited 22 Mar 2014
  3. 3.
    European Commission.: Proposal for a regulation of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General data protection regulation). http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf. Cited 22 Mar 2014
  4. 4.
    Hakuta, K., Sato, H., Takagi, T.: On tameness of Matsumoto-Imai central maps with three variables, In: Computer security symposium 2011 (3C3-4) (2011)Google Scholar
  5. 5.
    Harada, K., Sato, Y.: \(k\)-Anonymization schemes with automatic generation of generalization trees and distortion measuring using information entropy. In: IPSJ SIG technical reports 2010-CSEC-50, no.47, 1–7 (2010)Google Scholar
  6. 6.
    Koblitz, N.: Elliptic curve cryptosystems. Math. Comp. 48(177), 203–209 (1987)CrossRefMATHMathSciNetGoogle Scholar
  7. 7.
    McKinsey Global Institute.: Big data: The next frontier for innovation, competition, and productivity. http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation Cited 22 Mar 2014
  8. 8.
    Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)Google Scholar
  9. 9.
    Moh, M.M.: A fast public key system with signature and master key functions. Comm. Algebra 27(5), 2207–2222 (1999)CrossRefMATHMathSciNetGoogle Scholar
  10. 10.
    Moh, M.M.: An application of algebraic geometry to encryption: tame transformation method. Rev. Mat. Iberoamericana 19(2), 667–685 (2003)CrossRefMATHMathSciNetGoogle Scholar
  11. 11.
    Naganuma, K., Sato, H., Yoshino, M., Sato, Y.: Privacy preserved data analysis using searchable encryption, In: Symposium on cryptography and information, security 2014 (2C4-1)Google Scholar
  12. 12.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 361–396 (1978)CrossRefMathSciNetGoogle Scholar
  13. 13.
    Shestakov, I.P., Umirbaev, U.U.: The tame and the wild automorphisms of polynomial rings in three variables. J. Amer. Math. Soc. 17(1), 197–227 (2004)CrossRefMATHMathSciNetGoogle Scholar
  14. 14.
    Sweeney, L.: \(k\)-Anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)CrossRefMATHMathSciNetGoogle Scholar
  15. 15.
    Takahashi, K., Okeya, K., Japan patent 5297688Google Scholar
  16. 16.
    The White House.: Consumer data privacy in a networked world: a framework for protecting privacy and promoting innovation in the global digital economy, Feb 2012. Available at http://www.whitehouse.gov/sites/default/files/privacy-final.pdf
  17. 17.
    Vaidya, J., Clifton, C.W., Zhu, Y.M.: Privacy preserving data mining. vol 19 in advances in information security, springer, New York (2006)Google Scholar
  18. 18.
    Yoshino, M., Naganuma, K., Sato, H.: Symmetric searchable encryption for database applications, In: International Conference on Network-Based, Information Systems, pp. 657–662 (2011)Google Scholar

Copyright information

© Springer Japan 2014

Authors and Affiliations

  1. 1.Yokohama Research Laboratory, Hitachi, Ltd.YokohamaJapan

Personalised recommendations