Abstract
“Big Data” technology is the process of collecting and storing large amounts and wide varieties of data sets, and extracting valuable information and/or knowledge by analyzing them. Big Data analytics plays an important role in improving business services and quality of life. However, Big Data might include personal information such as credit card data, health-related data, purchasing history, geographic location data, etc. In Big Data analytics, the data sets may be accessed not only by the data holders but also by the third parties. This indicates a potential privacy breach. In addition, when public cloud is used as a platform of Big Data analytics, the risk of privacy breach might further increase. To protect against such threats, it is desirable to develop encryption schemes which are as efficient as possible and encryption schemes which allow to perform computations on encrypted data without decrypting it. In this paper, we present some of the latest results of our research related to the above challenge for Big Data security and privacy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cloud Security Alliance (CSA).: Security guidance for critical areas of focus in cloud computing V3.0. https://downloads.cloudsecurityalliance.org/initiatives/guidance/csaguide.v3.0.pdf. Cited 22 Mar 2014
Cloud Security Alliance (CSA).: Top threats to cloud computing v1.0. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf. Cited 22 Mar 2014
European Commission.: Proposal for a regulation of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General data protection regulation). http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf. Cited 22 Mar 2014
Hakuta, K., Sato, H., Takagi, T.: On tameness of Matsumoto-Imai central maps with three variables, In: Computer security symposium 2011 (3C3-4) (2011)
Harada, K., Sato, Y.: \(k\)-Anonymization schemes with automatic generation of generalization trees and distortion measuring using information entropy. In: IPSJ SIG technical reports 2010-CSEC-50, no.47, 1–7 (2010)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comp. 48(177), 203–209 (1987)
McKinsey Global Institute.: Big data: The next frontier for innovation, competition, and productivity. http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation Cited 22 Mar 2014
Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Moh, M.M.: A fast public key system with signature and master key functions. Comm. Algebra 27(5), 2207–2222 (1999)
Moh, M.M.: An application of algebraic geometry to encryption: tame transformation method. Rev. Mat. Iberoamericana 19(2), 667–685 (2003)
Naganuma, K., Sato, H., Yoshino, M., Sato, Y.: Privacy preserved data analysis using searchable encryption, In: Symposium on cryptography and information, security 2014 (2C4-1)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 361–396 (1978)
Shestakov, I.P., Umirbaev, U.U.: The tame and the wild automorphisms of polynomial rings in three variables. J. Amer. Math. Soc. 17(1), 197–227 (2004)
Sweeney, L.: \(k\)-Anonymity: a model for protecting privacy. Int. J. Uncertainty, Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)
Takahashi, K., Okeya, K., Japan patent 5297688
The White House.: Consumer data privacy in a networked world: a framework for protecting privacy and promoting innovation in the global digital economy, Feb 2012. Available at http://www.whitehouse.gov/sites/default/files/privacy-final.pdf
Vaidya, J., Clifton, C.W., Zhu, Y.M.: Privacy preserving data mining. vol 19 in advances in information security, springer, New York (2006)
Yoshino, M., Naganuma, K., Sato, H.: Symmetric searchable encryption for database applications, In: International Conference on Network-Based, Information Systems, pp. 657–662 (2011)
Acknowledgments
The authors would like to thank the anonymous reviewers for their careful reading of our manuscript and their many constructive comments and suggestions to improve the quality of the paper. A part of this work has been supported by Ministry of Internal Affairs and Communications of the Japanese Government.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Japan
About this paper
Cite this paper
Hakuta, K., Sato, H. (2014). Cryptographic Technology for Benefiting from Big Data. In: Wakayama, M., et al. The Impact of Applications on Mathematics. Mathematics for Industry, vol 1. Springer, Tokyo. https://doi.org/10.1007/978-4-431-54907-9_6
Download citation
DOI: https://doi.org/10.1007/978-4-431-54907-9_6
Published:
Publisher Name: Springer, Tokyo
Print ISBN: 978-4-431-54906-2
Online ISBN: 978-4-431-54907-9
eBook Packages: EngineeringEngineering (R0)