Cryptographic Technology for Benefiting from Big Data
“Big Data” technology is the process of collecting and storing large amounts and wide varieties of data sets, and extracting valuable information and/or knowledge by analyzing them. Big Data analytics plays an important role in improving business services and quality of life. However, Big Data might include personal information such as credit card data, health-related data, purchasing history, geographic location data, etc. In Big Data analytics, the data sets may be accessed not only by the data holders but also by the third parties. This indicates a potential privacy breach. In addition, when public cloud is used as a platform of Big Data analytics, the risk of privacy breach might further increase. To protect against such threats, it is desirable to develop encryption schemes which are as efficient as possible and encryption schemes which allow to perform computations on encrypted data without decrypting it. In this paper, we present some of the latest results of our research related to the above challenge for Big Data security and privacy.
KeywordsBig data Cloud computing Security Privacy Cryptography Anonymization
The authors would like to thank the anonymous reviewers for their careful reading of our manuscript and their many constructive comments and suggestions to improve the quality of the paper. A part of this work has been supported by Ministry of Internal Affairs and Communications of the Japanese Government.
- 1.Cloud Security Alliance (CSA).: Security guidance for critical areas of focus in cloud computing V3.0. https://downloads.cloudsecurityalliance.org/initiatives/guidance/csaguide.v3.0.pdf. Cited 22 Mar 2014
- 2.Cloud Security Alliance (CSA).: Top threats to cloud computing v1.0. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf. Cited 22 Mar 2014
- 3.European Commission.: Proposal for a regulation of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General data protection regulation). http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf. Cited 22 Mar 2014
- 4.Hakuta, K., Sato, H., Takagi, T.: On tameness of Matsumoto-Imai central maps with three variables, In: Computer security symposium 2011 (3C3-4) (2011)Google Scholar
- 5.Harada, K., Sato, Y.: \(k\)-Anonymization schemes with automatic generation of generalization trees and distortion measuring using information entropy. In: IPSJ SIG technical reports 2010-CSEC-50, no.47, 1–7 (2010)Google Scholar
- 7.McKinsey Global Institute.: Big data: The next frontier for innovation, competition, and productivity. http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation Cited 22 Mar 2014
- 8.Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)Google Scholar
- 11.Naganuma, K., Sato, H., Yoshino, M., Sato, Y.: Privacy preserved data analysis using searchable encryption, In: Symposium on cryptography and information, security 2014 (2C4-1)Google Scholar
- 15.Takahashi, K., Okeya, K., Japan patent 5297688Google Scholar
- 16.The White House.: Consumer data privacy in a networked world: a framework for protecting privacy and promoting innovation in the global digital economy, Feb 2012. Available at http://www.whitehouse.gov/sites/default/files/privacy-final.pdf
- 17.Vaidya, J., Clifton, C.W., Zhu, Y.M.: Privacy preserving data mining. vol 19 in advances in information security, springer, New York (2006)Google Scholar
- 18.Yoshino, M., Naganuma, K., Sato, H.: Symmetric searchable encryption for database applications, In: International Conference on Network-Based, Information Systems, pp. 657–662 (2011)Google Scholar