Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Secure Bio Semantic Computing Scheme
Authors: Hiroshi Yamaguchi, Phillip C.-Y. Sheu, Ryo Fujita, Shigeo Tsujii
Abstract:
In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.Keywords: Biomedical applications, private information retrieval (PIR), semantic capability description language (SCDL), semantic computing.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1108176
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1844References:
[1] B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, “Private information retrieval,” Proc. of 36th FOCS, 1995, pp. 41-50, 1995.
[2] B. Chor and N. Gilboa, “Computationally private information retrieval,” Proc. of 29th STOC, 1997, pp. 304-313, 1997.
[3] S. Tsujii, H. Yamaguchi, and T. Morizumi, “Proposal on concept of encryption theory based on logic -Toward realization of confidentiality preserving retrieval and creation of answer by natural language-,” SCIS 2013,
[4] S. Tsujii, H. Yamaguchi and T. Morizumi, “Proposal on concept of encrypted state processing at semantic layer -Toward realization of confidentiality preserving retrieval and creation of answer by natural language-”, ISEC 2012 Technical Report, 2012.
[5] K. Chida, K. Hamada, D. Ikarashi, and K. Takahashi, “A three-party secure function evaluation with lightweight verifiability revisited,” CSS2010, 2010.
[6] S. Wang, R.-M. Hu, H. C. W. Hsiao, D. A. Hecht, K.-L. Ng, R.-M. Chen, P. C.-Y. Sheu, and J. J. P. Tsai, “Using SCDL for integrating tools and data for complex biomedical applications,” International Journal of Semantic Computing, 2(2), pp, 291-308, June 2008.
[7] R. Crammer, R. Gennaro, and B. Shoenmakers, “A secure and optimally efficient multi-authority election scheme,” Advances in Cryptology -EUROCRYPT’97, LNCS1233. pp. 103-118, 1997.
[8] A. Shamir, “How to share a secret,” Communication of the ACM, 22(11), pp. 612-613, 1979.
[9] P. C.-Y. Sheu and A. Kitazawa, “From Semantic Objects to Semantic Software Engineering,” International Journal of Semantic Computing, 1(1), pp. 11-28, 2007.
[10] F. Sanger, S. Nicklen, and A. R. Coulson, “DNA sequencing with chain-terminating inhibitors,” Proc. Natl. Acd. Sci. USA, 74(12), pp. 5463-5467, 1977.
[11] P. H. Sellers, “Pattern recognition in genetic sequences,” Proc. Natl. Acd. Sci. USA, 76(7), p. 3041, 1979.
[12] A. Sepulveda, M. Pieber, M. A. Soto, and J. C. Toha, “Storage and retrieval of biomolecule sequences,” K/ Theor. Biol. 103(2) pp. 331-332, 1983.
[13] H. Peltola, H. Söderlund, and E. Ukkonen, “Algorithms for the search of amino acid patterns in nucleic acid sequences,” Nucleic Acids Research, 14(1), pp.99-107, 1986.
[14] P. Gilna, L. J. Tomlinson, and C. Burks, “Submission of nucleotide sequence data to GenBank,” Journal of General Microbiology, 135(7), pp. 1779-1786, 1989.
[15] W. R. Pearson and W. Miller, “Dynamic programming algorithms for biological sequence comparison,” Methods in Enzymology, 210, pp. 575-601, 1992.
[16] J. Gollub, C. A. Ball, and G. Sherlock, “The Stanford Microarray Database: a user’s guide,” Methods in Molecular Biology, 338, pp. 191-208, 2006.
[17] O. Langella, M. Zivy, and J. Joets, “The PROTICdb database for 2-DE proteomics,” Methods in Molecular Biology, 355, pp. 279-303, 2007.