• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Design and Security Analysis of Cryptographic Protocol for Privacy-Preserving Data Mining

Research Project

Project/Area Number 20300005
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Fundamental theory of informatics
Research InstitutionKyushu University

Principal Investigator

SAKURAI Kouichi  Kyushu University, システム情報科学研究院, 教授 (60264066)

Co-Investigator(Kenkyū-buntansha) HORI Yoshiaki  九州大学, システム情報科学研究院, 准教授 (90264126)
TAKAHASHI Kenichi  鳥取大学, 大学院・工学研究科情報エレクトロニクス, 准教授 (30399670)
HASHIMOTO Yasufumi  財団法人九州先端科学技術研究所, 研究員 (30452733)
NISHIDE Takashi  九州大学, システム情報科学研究院, 助教 (70570985)
Co-Investigator(Renkei-kenkyūsha) ARARAGI Tadashi  NTT, コミュニケーション科学基礎研究所, 主任研究員 (00396136)
SU Chunhua  九州大学, 大学院・システム科学府, 博士(学振特別研究員)
Project Period (FY) 2008 – 2010
Project Status Completed (Fiscal Year 2010)
Budget Amount *help
¥10,920,000 (Direct Cost: ¥8,400,000、Indirect Cost: ¥2,520,000)
Fiscal Year 2010: ¥2,990,000 (Direct Cost: ¥2,300,000、Indirect Cost: ¥690,000)
Fiscal Year 2009: ¥3,380,000 (Direct Cost: ¥2,600,000、Indirect Cost: ¥780,000)
Fiscal Year 2008: ¥4,550,000 (Direct Cost: ¥3,500,000、Indirect Cost: ¥1,050,000)
Keywords暗号 / データマイニング / プライバシー保護 / 安全性検証 / 普遍安全性 / プライバシ
Research Abstract

In the process of data mining, there exists a problem about privacy breach because we need to deal with health data, personal preferences, etc. There are approaches to privacy preserving data mining in which random noisy data are added to the original data or computation and communication are performed without breaking the structure of original data. In this research, we designed cryptographic protocols whose security can be proved in a theoretical way. For the security model, we use Universal Composability (UC) in which combining several protocols can be done securely. We designed protocols such as oblivious transfer for data mining whose security was proved only in the previous security model, and proved the security in the notion of UC.

Report

(4 results)
  • 2010 Annual Research Report   Final Research Report ( PDF )
  • 2009 Annual Research Report
  • 2008 Annual Research Report
  • Research Products

    (30 results)

All 2011 2010 2009 2008 Other

All Journal Article (9 results) (of which Peer Reviewed: 8 results) Presentation (18 results) Remarks (2 results) Patent(Industrial Property Rights) (1 results)

  • [Journal Article] Realizing Fine-grained and Flexible Access Control to Outsourced Data with Attribute-based Cryptosystems2011

    • Author(s)
      Fangming Zhao, Takashi Nishide, Kouichi Sakurai
    • Journal Title

      7th Information Security Practice and Experience Conference (ISPEC) LNCS6672 Springer-Verlag

      Pages: 83-97

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] Distributed Paillier Cryptosystem without Trusted Dealer2011

    • Author(s)
      Takashi Nishide, Kouichi Sakurai
    • Journal Title

      11th International Workshop on Information Security Applications (WISA2010) LNCS6513

      Pages: 44-60

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] Distributed Paillier Cryptosystem without Trusted Dealer2011

    • Author(s)
      T.Nishide, K.Sakurai
    • Journal Title

      International Workshop on Information Security Applications

      Volume: Springer LNCS6513 Pages: 44-60

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Analysis of Existing Privacy-Preserving Protocols in Domain Name System2010

    • Author(s)
      F.Zhao, Y.Hori, K.Sakurai
    • Journal Title

      IEICE TRANSACTIONS on Information and Systems

      Volume: Vol.E93-D No.5 Pages: 1031-1043

    • NAID

      10026815407

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] "Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Scheme,2009

    • Author(s)
      C.Su, F.Bao, J.Zhou, T.Takagi, K.Sakurai,
    • Journal Title

      IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer, Vol. E92-A No. 4,

      Pages: 1246-1250

    • NAID

      10026857427

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Distributed Noise Generation for Density Estimation Based Clustering Without Trusted Third Party2009

    • Author(s)
      C.Su, F.Bao, J.Zhou, T.Takagi, K.Sakurai,
    • Journal Title

      IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer, Vol. E92-A,

    • NAID

      10026858826

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Importance of Data Standardization in Privacy-Preserving K-means Clustering,2009

    • Author(s)
      Chunhua Su, Justin Zhan, Kouichi Sakurai
    • Journal Title

      International Workshop on Privacy-Preserving Data Analysis in conjunction with Database Systems for Advanced Applications(DASFAA 2009), Springer LNCS5667

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree2008

    • Author(s)
      Chunhua Su
    • Journal Title

      Proc. of the4th International Conference on Advanced Data Mining and Applications (ADMA2008) Springer LNAI5139

      Pages: 170-181

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 頻出パターンを利用した安全な相関ルール発見手法2008

    • Author(s)
      蘇春華
    • Journal Title

      電子隋報通信学会技術報告 V108・N162

      Pages: 177-182

    • Related Report
      2008 Annual Research Report
  • [Presentation] 多変数暗号に対する故障利用攻撃について2011

    • Author(s)
      橋本康史, 高木剛, 櫻井幸一
    • Organizer
      2011暗号と情報セキュリティシンポジウム
    • Place of Presentation
      福岡
    • Year and Date
      2011-01-27
    • Related Report
      2010 Annual Research Report
  • [Presentation] 2重DESに対する中間一致攻撃への耐性強化手法2011

    • Author(s)
      西出隆志, 吉永真一, Rishiraj Bhattacharyya, Bimal Roy, 櫻井幸一
    • Organizer
      2011暗号と情報セキュリティシンポジウム
    • Place of Presentation
      福岡
    • Year and Date
      2011-01-26
    • Related Report
      2010 Annual Research Report
  • [Presentation] IFIP WG 11.3 Working Conference on Data and ApPlications Security and Privacy 2010会議参加報告2010

    • Author(s)
      西出隆志, Amril Syalim, 櫻井幸一
    • Organizer
      コンピュータセキュリティシンポジウム(CSS),6pages
    • Place of Presentation
      岡山
    • Year and Date
      2010-10-21
    • Related Report
      2010 Final Research Report
  • [Presentation] ルールレポジトリを用いたユーザがカスタマイズ可能なデータ保護方法の提案2010

    • Author(s)
      高橋健一, 松崎隆啓, 峯恒憲, 櫻井幸一
    • Organizer
      2010Computer Security Symposium
    • Place of Presentation
      岡山
    • Year and Date
      2010-10-19
    • Related Report
      2010 Annual Research Report
  • [Presentation] Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance2010

    • Author(s)
      Amril Syalim, Takashi Nishide, Kouichi Sakurai
    • Organizer
      情報科学技術フォーラム(FIT),2pages
    • Place of Presentation
      福岡
    • Year and Date
      2010-09-09
    • Related Report
      2010 Final Research Report
  • [Presentation] (k,n)秘密分散上での関係データベースの構造演算の実現2010

    • Author(s)
      志村正法, 西出隆志, 吉浦裕
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS),6pages
    • Place of Presentation
      香川
    • Year and Date
      2010-01-21
    • Related Report
      2010 Final Research Report
  • [Presentation] An Augmented Accountable Computing Framework for Transactional Databases,2010

    • Author(s)
      Chunhua Su_Guilin Wang, Kouichi Sakurai
    • Organizer
      2010年暗号と情報セキュリティシンポジウム,
    • Place of Presentation
      高松
    • Year and Date
      2010-01-20
    • Related Report
      2009 Annual Research Report
  • [Presentation] Distributed Key Generation for Paillier Cryptosystem2010

    • Author(s)
      西出隆志, 櫻井幸一
    • Organizer
      暗号と情報セキユリテイシンポジウム(SCIS),6pages
    • Place of Presentation
      香川
    • Year and Date
      2010-01-19
    • Related Report
      2010 Final Research Report
  • [Presentation] Efficient Adaptively Secure Oblivious Polynomial Evaluation with Universal Composability : If Homomorphic and Non-committing Encryption Exists2010

    • Author(s)
      Chunhua Su, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai
    • Organizer
      暗号と情報セキユリテイシンポジウム(SCIS),6pages
    • Place of Presentation
      香川
    • Year and Date
      2010-01-19
    • Related Report
      2010 Final Research Report
  • [Presentation] 線形変換したテータ行列の固有値分布と安全性評価2009

    • Author(s)
      蘇春華, 櫻井幸一
    • Organizer
      CDROM 3F4-4, 5ページ
    • Place of Presentation
      滋賀
    • Year and Date
      2009-01-22
    • Related Report
      2010 Final Research Report
  • [Presentation] プライバシー保護したK平均クラスタリングにおけるデータ標準化問題2009

    • Author(s)
      蘇春華, 櫻井幸一
    • Organizer
      CDROM 3F4-5,5ページ
    • Place of Presentation
      滋賀
    • Year and Date
      2009-01-22
    • Related Report
      2010 Final Research Report
  • [Presentation] 線形変換したデータ行列の固有値分布と安全性評価2009

    • Author(s)
      蘇 春華
    • Organizer
      暗号と情報セキュリティシンポジウム2009
    • Place of Presentation
      滋賀県大津市
    • Year and Date
      2009-01-22
    • Related Report
      2008 Annual Research Report
  • [Presentation] プライバシー保護したK平均クラスタリングにおけるデータ標準化問題2009

    • Author(s)
      蘇 春華
    • Organizer
      暗号と情報セキュリティシンポジウム2009
    • Place of Presentation
      滋賀県大津市
    • Year and Date
      2009-01-22
    • Related Report
      2008 Annual Research Report
  • [Presentation] 分散環境におけるテキストマイニングのプライバシー保護手法と実験分析2008

    • Author(s)
      蘇春華, 櫻井幸一
    • Organizer
      コンピュータセキュリティシンポジウム2008(CSS 2008), CDROM C5-1,6ページ
    • Place of Presentation
      沖縄
    • Year and Date
      2008-10-09
    • Related Report
      2010 Final Research Report
  • [Presentation] 頻出パターンを利用した安全な相関ルール発見手法2008

    • Author(s)
      蘇春華, 櫻井幸一
    • Organizer
      信学技報,vo1.108,no.162,ISEC2008-59,177-182
    • Year and Date
      2008-07-25
    • Related Report
      2010 Final Research Report
  • [Presentation] Security Problems in Existing Privacy-preserving K-means Clustering Schemes2008

    • Author(s)
      Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai
    • Organizer
      電子情報通信学会全国総合大会
    • Place of Presentation
      北九州学研都市
    • Year and Date
      2008-03-19
    • Related Report
      2010 Final Research Report
  • [Presentation] Universally Composable Oblivious Polynomial Evaluation2008

    • Author(s)
      蘇春華, 櫟粛之, 櫻井幸一
    • Organizer
      電子情報通信学会全国総合大会
    • Place of Presentation
      北九州学研都市
    • Year and Date
      2008-03-18
    • Related Report
      2010 Final Research Report
  • [Presentation] 汎用的結合可能なK平均クラスタリングプロトコル2008

    • Author(s)
      蘇春華, 櫟粛之, 櫻井幸一
    • Organizer
      2008年暗号と情報セキュリティシンポジウム(SCIS 2007),3E-3
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-24
    • Related Report
      2010 Final Research Report
  • [Remarks] ホームページ等

    • URL

      http://itstab.csce.kyushu-u.ac.jp/index-j.html

    • Related Report
      2010 Final Research Report
  • [Remarks]

    • URL

      http://itslab.csce.kyushu-u.ac.jp/index-j.html

    • Related Report
      2010 Annual Research Report
  • [Patent(Industrial Property Rights)] 理想機能実現装置、方法、プログラム2010

    • Inventor(s)
      櫻井幸一
    • Industrial Property Rights Holder
      櫻井幸一
    • Industrial Property Number
      2010-221865
    • Filing Date
      2010-09-30
    • Related Report
      2010 Final Research Report

URL: 

Published: 2008-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi