Skip to main content

Cryptographic Technology for Benefiting from Big Data

  • Conference paper
  • First Online:

Part of the book series: Mathematics for Industry ((MFI,volume 1))

Abstract

“Big Data” technology is the process of collecting and storing large amounts and wide varieties of data sets, and extracting valuable information and/or knowledge by analyzing them. Big Data analytics plays an important role in improving business services and quality of life. However, Big Data might include personal information such as credit card data, health-related data, purchasing history, geographic location data, etc. In Big Data analytics, the data sets may be accessed not only by the data holders but also by the third parties. This indicates a potential privacy breach. In addition, when public cloud is used as a platform of Big Data analytics, the risk of privacy breach might further increase. To protect against such threats, it is desirable to develop encryption schemes which are as efficient as possible and encryption schemes which allow to perform computations on encrypted data without decrypting it. In this paper, we present some of the latest results of our research related to the above challenge for Big Data security and privacy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cloud Security Alliance (CSA).: Security guidance for critical areas of focus in cloud computing V3.0. https://downloads.cloudsecurityalliance.org/initiatives/guidance/csaguide.v3.0.pdf. Cited 22 Mar 2014

  2. Cloud Security Alliance (CSA).: Top threats to cloud computing v1.0. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf. Cited 22 Mar 2014

  3. European Commission.: Proposal for a regulation of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General data protection regulation). http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf. Cited 22 Mar 2014

  4. Hakuta, K., Sato, H., Takagi, T.: On tameness of Matsumoto-Imai central maps with three variables, In: Computer security symposium 2011 (3C3-4) (2011)

    Google Scholar 

  5. Harada, K., Sato, Y.: \(k\)-Anonymization schemes with automatic generation of generalization trees and distortion measuring using information entropy. In: IPSJ SIG technical reports 2010-CSEC-50, no.47, 1–7 (2010)

    Google Scholar 

  6. Koblitz, N.: Elliptic curve cryptosystems. Math. Comp. 48(177), 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  7. McKinsey Global Institute.: Big data: The next frontier for innovation, competition, and productivity. http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation Cited 22 Mar 2014

  8. Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  9. Moh, M.M.: A fast public key system with signature and master key functions. Comm. Algebra 27(5), 2207–2222 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  10. Moh, M.M.: An application of algebraic geometry to encryption: tame transformation method. Rev. Mat. Iberoamericana 19(2), 667–685 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  11. Naganuma, K., Sato, H., Yoshino, M., Sato, Y.: Privacy preserved data analysis using searchable encryption, In: Symposium on cryptography and information, security 2014 (2C4-1)

    Google Scholar 

  12. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 361–396 (1978)

    Article  MathSciNet  Google Scholar 

  13. Shestakov, I.P., Umirbaev, U.U.: The tame and the wild automorphisms of polynomial rings in three variables. J. Amer. Math. Soc. 17(1), 197–227 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  14. Sweeney, L.: \(k\)-Anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  15. Takahashi, K., Okeya, K., Japan patent 5297688

    Google Scholar 

  16. The White House.: Consumer data privacy in a networked world: a framework for protecting privacy and promoting innovation in the global digital economy, Feb 2012. Available at http://www.whitehouse.gov/sites/default/files/privacy-final.pdf

  17. Vaidya, J., Clifton, C.W., Zhu, Y.M.: Privacy preserving data mining. vol 19 in advances in information security, springer, New York (2006)

    Google Scholar 

  18. Yoshino, M., Naganuma, K., Sato, H.: Symmetric searchable encryption for database applications, In: International Conference on Network-Based, Information Systems, pp. 657–662 (2011)

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers for their careful reading of our manuscript and their many constructive comments and suggestions to improve the quality of the paper. A part of this work has been supported by Ministry of Internal Affairs and Communications of the Japanese Government.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Keisuke Hakuta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Japan

About this paper

Cite this paper

Hakuta, K., Sato, H. (2014). Cryptographic Technology for Benefiting from Big Data. In: Wakayama, M., et al. The Impact of Applications on Mathematics. Mathematics for Industry, vol 1. Springer, Tokyo. https://doi.org/10.1007/978-4-431-54907-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-4-431-54907-9_6

  • Published:

  • Publisher Name: Springer, Tokyo

  • Print ISBN: 978-4-431-54906-2

  • Online ISBN: 978-4-431-54907-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics