1R01HG : Privacy-Preserving Sharing and Analysis of Human Genomic Data. XiaoFeng Wang and Haixu Tang, IUB
|
|
- Gerard Gregory
- 8 years ago
- Views:
Transcription
1 1R01HG : Privacy-Preserving Sharing and Analysis of Human Genomic Data XiaoFeng Wang and Haixu Tang, IUB
2 Project Objectives Study of Scalable, Privacy-Preserving Data Analysis, particular those for public clouds Study of Privacy-Preserving Data Dissemination techniques for data sharing through NIH data centers
3 Project Progress Summary Secure Data Analysis Improving our privacy-preserving read-mapping techniques Exploring use of the technique for microbial filtering Secure Data Sharing Development of privacy-preserving data selection techniques Identification of the most promising way for supporting privacy-preserving GWAS studies Organization of the first Critical Assessment of Data Privacy and Protection (CADPP) Others Evaluating privacy risks in releasing clinical proteomic data Survey study on human genome privacy and building of a portal to support follow-up research
4 Hybrid-cloud Secure Data Analysis Partitions of the computation on privacy and public Cloud to support secure computation outsourcing Private Cloud For microbial filtering, Public Cloud We found that the computation can be performed almost entirely in the public cloud on encrypted data.
5 Data Analysis and Dissemination Services Programs Results
6 Technical Highlights LD-based noise adding technique Dimension reduction Noise adding that preserves utility in pilot data Utility assessment mechanism For identification of the data source most likely to have usable data Evaluation Use 4 popular association tests For releasing a locus with 180 SNPs In the vast majority cases, the user can find most useful dataset, without leaking out any information Product A paper is being considered by JAMIA (revision submitted).
7 The CADPP Competition Evaluate how effective the best security technologies could be in protecting patient privacy and preserving data utility The first challenge focuses on the tasks for sharing aggregate SNP data (allele frequencies) for GWAS studies
8 Research Tasks Development of techniques for analyzing the level of information leaks from computation results Preliminarily explore the approach for secure data disseminations
9 Teams and Tasks 6 teams U. Oklahoma UT Dallas McGill University CMU UT Austin IU (Baseline) Scenarios: Privacy Protection for GWAS Task 1: raw data sharing Task 2: outcome release
10 What has been Learnt Task 1 It remains a challenge to privacy-preserved sharing of aggregate human genomic data, while maintaining their utilities in genome-wide association studies (GWAS). Even for a single genomic locus involving a few hundreds of SNPs, the utility of the data was large damaged after noise-adding to ensure privacy protection It is un-likely that current privacy-preserving techniques will scale well for sharing whole human genomic data Task 2 Privacy-preserving techniques work surprisingly well on publishing outcomes of GWAS-like analyses High accuracy can be achieved when only a small number of most significant SNPs are concerned from the users perspective This task is well aligned with the centralized data/computing model The centralized data/computing center will host human genomic data as well as service for customized analyses on these data, and will only release the results of these analyses to users We encourage the community to improve the approaches to this task!
11 Other Outcomes BMC special issue on Human Genome Privacy Development of a web service for automatic evaluation of privacy-preserving GWAS techniques ( Competition results are made public:
12 Risks in releasing clinical proteomic data Presence of Identifiable information in clinical proteomic data The risks could be mitigated through pre-processing, removing such data Further study is needed to understand the privacy/utility balance
13 Dissemination of Research Outcomes Organization of the 1 st Workshop on Genome Privacy (GenoPri): July 15, Amsterdam Review paper on Privacy Risk and Mitigation Techniques on Genomic Research
14 Next Steps Privacy-preserving data analysis Complete the development of read-mapping system Further study on microbial filtering Research on other crypto techniques for genomic data analysis on the public cloud Privacy-preserving data sharing Improve the scalability of data-selection techniques Analyze risks of information leaks on the data center Organization of the 2 nd CADPP competition with idash A tentative topic is to evaluate the performance of techniques for data analysis on encrypted data (e.g., homomorphic encryption, secure multi-party computation, etc.)
NSF Workshop on Big Data Security and Privacy
NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and
More informationDifferential privacy in health care analytics and medical research An interactive tutorial
Differential privacy in health care analytics and medical research An interactive tutorial Speaker: Moritz Hardt Theory Group, IBM Almaden February 21, 2012 Overview 1. Releasing medical data: What could
More informationEFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
More informationAssociate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
More informationResearch Data Networks: Privacy- Preserving Sharing of Protected Health Informa>on
Research Data Networks: Privacy- Preserving Sharing of Protected Health Informa>on Lucila Ohno-Machado, MD, PhD Division of Biomedical Informatics University of California San Diego PCORI Workshop 7/2/12
More informationCloud-Based Big Data Analytics in Bioinformatics
Cloud-Based Big Data Analytics in Bioinformatics Presented By Cephas Mawere Harare Institute of Technology, Zimbabwe 1 Introduction 2 Big Data Analytics Big Data are a collection of data sets so large
More informationpreliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
More informationHomomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
More informationCloud Computing. Key Initiative Overview
David W. Cearley Research Vice President and Gartner Fellow This overview provides a high-level description of the Cloud Computing Key Initiative. IT leaders can use this guide to understand what they
More informationArnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
More informationTop Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
More informationSocietal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse 2015 21-22 April Oslo
Privacy Societal benefits vs. privacy: what distributed secure multi-party computation enable? Research ehelse 2015 21-22 April Oslo Kassaye Yitbarek Yigzaw UiT The Arctic University of Norway Outline
More informationTechnical Approaches for Protecting Privacy in the PCORnet Distributed Research Network V1.0
Technical Approaches for Protecting Privacy in the PCORnet Distributed Research Network V1.0 Guidance Document Prepared by: PCORnet Data Privacy Task Force Submitted to the PMO Approved by the PMO Submitted
More informationIncent Perform Grow. Forecasting, Budgeting and Accruing Bonuses AN INCENTIVE COMPENSATION IMPERATIVE
Incent Perform Grow Forecasting, Budgeting and Accruing Bonuses AN INCENTIVE COMPENSATION IMPERATIVE Overview For companies in all industries, incentive compensation and bonus structures are valuable tools
More informationA Privacy-preserving Approach for Records Management in Cloud Computing. Eun Park and Benjamin Fung. School of Information Studies McGill University
A Privacy-preserving Approach for Records Management in Cloud Computing Eun Park and Benjamin Fung School of Information Studies McGill University Digital transformation Privacy Conflict? Health service
More informationExecutive Summary BIG DATA Future Opportunities and Challenges for the German Industry
Executive Summary BIG DATA Future Opportunities and Challenges for the German Industry BIG DATA Future Opportunities and Challanges in the German Industry Executive Summary The quantity of available data
More informationSurvey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,
More informationSecure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
More informationPrivacy Preserving Public Auditing for Data in Cloud Storage
Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of
More informationConsor;um (partners) ARES conference Toulouse, 24 August 2015
1 2 3 Consor;um (partners) 4 The honest- but- curious CSP model (cloud service provider)? 5 an attack tolerant framework Ambi;on in the context of honest-but-curious CSPs preserving the benefits associated
More informationDEVELOPING THE SCIENCE OF PRIVACY IN SUPPORT OF THE ART OF PRIVACY. NSA Civil Liberties & Privacy Office Feb 2015
DEVELOPING THE SCIENCE OF PRIVACY IN SUPPORT OF THE ART OF PRIVACY 1 NSA Civil Liberties & Privacy Office Feb 2015 AGENDA The Problem: Civil Liberties & Privacy Assessments, Big Data, & Privacy Risk Back
More informationNIH s Genomic Data Sharing Policy
NIH s Genomic Data Sharing Policy 2 Benefits of Data Sharing Enables data generated from one study to be used to explore a wide range of additional research questions Increases statistical power and scientific
More informationSearch and Data Mining: Techniques. Applications Anya Yarygina Boris Novikov
Search and Data Mining: Techniques Applications Anya Yarygina Boris Novikov Introduction Data mining applications Data mining system products and research prototypes Additional themes on data mining Social
More informationGENETIC DATA ANALYSIS
GENETIC DATA ANALYSIS 1 Genetic Data: Future of Personalized Healthcare To achieve personalization in Healthcare, there is a need for more advancements in the field of Genomics. The human genome is made
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationArnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
More informationEnabling the Big Data Commons through indexing of data and their interactions
biomedical and healthcare Data Discovery Index Ecosystem Enabling the Big Data Commons through indexing of and their interactions 2 nd BD2K all-hands meeting Bethesda 11/12/15 Aims 1. Help users find accessible
More informationPrivacy-preserving Data-aggregation for Internet-of-things in Smart Grid
Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid Aakanksha Chowdhery Postdoctoral Researcher, Microsoft Research ac@microsoftcom Collaborators: Victor Bahl, Ratul Mahajan, Frank
More informationWorkshop on Establishing a Central Resource of Data from Genome Sequencing Projects
Report on the Workshop on Establishing a Central Resource of Data from Genome Sequencing Projects Background and Goals of the Workshop June 5 6, 2012 The use of genome sequencing in human research is growing
More informationIs Grid or Cloud Computing Suitable for Normalization of Microarray Data and Resampling Approaches for SNP Data?
1/ 16 Is Grid or Cloud Computing Suitable for Normalization of Microarray Data and Resampling Approaches for SNP Data? for Computational (Bio-)Statistics LMU Munich Institute for Medical Information Sciences,
More informationA Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No!
A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada THE AGE OF
More informationSecure Computation Martin Beck
Institute of Systems Architecture, Chair of Privacy and Data Security Secure Computation Martin Beck Dresden, 05.02.2015 Index Homomorphic Encryption The Cloud problem (overview & example) System properties
More informationNIST Big Data Public Working Group
NIST Big Data Public Working Group Requirements May 13, 2014 Arnab Roy, Fujitsu On behalf of the NIST BDWG S&P Subgroup S&P Requirements Emerging due to Big Data Characteristics Variety: Traditional encryption
More informationSecurity and Privacy in Big Data, Blessing or Curse?
Security and Privacy in Big Data, Blessing or Curse? 2 nd National Cryptography Days 9-11 April 2015 Dr. Zeki Erkin Cyber Security Section Department of Intelligent Systems Delft University of Technology
More informationHow To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
More informationBig Data Analytics and Healthcare
Big Data Analytics and Healthcare Anup Kumar, Professor and Director of MINDS Lab Computer Engineering and Computer Science Department University of Louisville Road Map Introduction Data Sources Structured
More informationPRIVACY-PRESERVING DATA ANALYSIS AND DATA SHARING
PRIVACY-PRESERVING DATA ANALYSIS AND DATA SHARING Chih-Hua Tai Dept. of Computer Science and Information Engineering, National Taipei University New Taipei City, Taiwan BENEFIT OF DATA ANALYSIS Many fields
More informationPrivacy by Design. Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII
Privacy by Design Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII Privacy by Design principles 1. Proactive not Reactive; Preventative
More informationCost of Poor Quality:
Cost of Poor Quality: Analysis for IT Service Management Software Software Concurrent Session: ISE 09 Wed. May 23, 8:00 AM 9:00 AM Presenter: Daniel Zrymiak Key Points: Use the Cost of Poor Quality: Failure
More informationEnsuring Integrity in Cloud Computing via Homomorphic Digital Signatures: new tools and results
Ensuring Integrity in Cloud Computing via Homomorphic Digital Signatures: new tools and results Dario Catalano Dario Fiore Luca Nizzardo University of Catania Italy IMDEA Software Institute Madrid, Spain
More informationSAP HANA Enabling Genome Analysis
SAP HANA Enabling Genome Analysis Joanna L. Kelley, PhD Postdoctoral Scholar, Stanford University Enakshi Singh, MSc HANA Product Management, SAP Labs LLC Outline Use cases Genomics review Challenges in
More informationAn Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer
More informationInformation Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787
Information Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787 2015/5/13 OUTLINE Introduction User Role Based Methodology Data Provider Data Collector Data Miner Decision
More informationData Outsourcing based on Secure Association Rule Mining Processes
, pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim
More informationSouth East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected
At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At
More informationCybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
More informationBig Data - Security and Privacy
Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center! Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,
More informationGlobally, about 9.7% of cancers in men are prostate cancers, and the risk of developing the
Chapter 5 Analysis of Prostate Cancer Association Study Data 5.1 Risk factors for Prostate Cancer Globally, about 9.7% of cancers in men are prostate cancers, and the risk of developing the disease has
More informationTowards Privacy aware Big Data analytics
Towards Privacy aware Big Data analytics Pietro Colombo, Barbara Carminati, and Elena Ferrari Department of Theoretical and Applied Sciences, University of Insubria, Via Mazzini 5, 21100 - Varese, Italy
More informationPRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
More informationUCD International UCD IT Services. IT12 - Device Security & Encryption Strategy. Project Initiation Document. Version 1.0 2 nd December 2014
UCD International UCD IT Services IT12 - Device Security & Encryption Strategy Project Initiation Document Version 1.0 2 nd December 2014 Version History Version Date Summary of Changes Changed by 1.0
More informationConcept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
More informationCiteSeer x in the Cloud
Published in the 2nd USENIX Workshop on Hot Topics in Cloud Computing 2010 CiteSeer x in the Cloud Pradeep B. Teregowda Pennsylvania State University C. Lee Giles Pennsylvania State University Bhuvan Urgaonkar
More informationHPC Cloud Computing with OpenNebula
High Performance Cloud Computing Day BiG Grid - SARA Amsterdam, The Netherland, October 4th, 2011 HPC Cloud Computing with OpenNebula Ignacio M. Llorente Project Director Acknowledgments The research leading
More informationNear Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
More informationEfficient Similarity Search over Encrypted Data
UT DALLAS Erik Jonsson School of Engineering & Computer Science Efficient Similarity Search over Encrypted Data Mehmet Kuzu, Saiful Islam, Murat Kantarcioglu Introduction Client Untrusted Server Similarity
More informationCOLLEAGUES. CLIENTS. CONNECTED. CLOUD.
COLLEAGUES. CLIENTS. CONNECTED. CLOUD. THOMSON REUTERS Simplifying your life with powerful, integrated and innovative solutions. The Tax & Accounting business of Thomson Reuters provides the profession
More informationA Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
More informationAdvantages and Drawbacks of Developing Mobile Health Technologies in the Cloud
Advantages and Drawbacks of Developing Mobile Health Technologies in the Cloud Nima Kaviani - @nimak http://nima.magic.ubc.ca Director of Technology Curatio Networks Inc. Mobile Health in the Cloud Cloud
More informationVs Encryption Suites
Vs Encryption Suites Introduction Data at Rest The phrase "Data at Rest" refers to any type of data, stored in the form of electronic documents (spreadsheets, text documents, etc.) and located on laptops,
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582
1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, Sujiraj.me@gmail.com 2. Assistant Professor, visaranams@yahoo.co.in
More informationCloud and Mobile Computing
Cloud and Mobile Computing Protect Privacy in Offloading Yung-Hsiang Lu Electrical and Computer Engineering Purdue University Technological Trends Mobile systems become primary computing platforms for
More informationDATA MINING - 1DL360
DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
More informationSECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES
SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES 1 MANJOORULLASHA SHAIK, 2 SYED.ABDULHAQ, 3 P.BABU 1 PG SCHOLAR, CSE (CN), QCET, NELLORE 2,3 ASSOCIATE PROFESSOR, CSE, QCET, NELLORE
More informationPrivacy and Security in Cloud Computing
Réunion CAPPRIS 21 mars 2013 Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Ӧnen Slide 1 Cloud computing Idea: Outsourcing Ø Huge distributed data centers Ø Offer storage and computation Benefit:
More informationSecure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net
Secure Enterprise Mobility Management White Paper: Cloud-Based Enterprise Mobility Management soti.net Background Facing a business environment of constant change and increasing complexity, enterprises
More informationCloud Governance is more than Security. Cloud Law or Legal Cloud?
more than Security Cloud Law or Legal Cloud? more than Security Governance principles more than Security Governance principles 1. Context definition Which organisation/ structure? Which roles and responsibilities?
More informationCloud Technology Influence on Testing Testing and new found challenges that come with cloud technologies.
White Paper: Cloud Technology Influence on Testing Cloud Technology Influence on Testing Testing and new found challenges that come with cloud technologies. http://www.prakat.com USA India info@prakat.com
More informationSecurity for Cloud & Big Data
Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 25, 2016 Awesome Project 2 Solutions Honorable mention: Vincent Wang and John Choi super-efficient updates (6-9x better
More informationAn Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
More informationSecure Data Sharing and Processing in Heterogeneous Clouds. Bojan Suzic, Graz University of Technology
Secure Data Sharing and Processing in Heterogeneous Clouds Bojan Suzic, Graz University of Technology 1 Presentation Outline SUNFISH Project Cloud Service for Public Administration Practical Approach Data
More informationTERENA Trusted Cloud Drive
SUCRE Workshop Open Source Clouds in the public sector 16-17 April, 2013 Poznan, Poland Peter Szegedi Project Development Officer szegedi@terena.org www.terena.org TERENA Trusted Cloud Drive Unleashing
More informationUniversity Uses Business Intelligence Software to Boost Gene Research
Microsoft SQL Server 2008 R2 Customer Solution Case Study University Uses Business Intelligence Software to Boost Gene Research Overview Country or Region: Scotland Industry: Education Customer Profile
More informationAN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING(27-32) AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING
AN IMPROVED PRIVACY PRESERVING ALGORITHM USING ASSOCIATION RULE MINING Ravindra Kumar Tiwari Ph.D Scholar, Computer Sc. AISECT University, Bhopal Abstract-The recent advancement in data mining technology
More informationA SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of
More informationSecure semantic based search over cloud
Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,
More informationIEEE JAVA Project 2012
IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing
More informationHealthcare data analytics. Da-Wei Wang Institute of Information Science wdw@iis.sinica.edu.tw
Healthcare data analytics Da-Wei Wang Institute of Information Science wdw@iis.sinica.edu.tw Outline Data Science Enabling technologies Grand goals Issues Google flu trend Privacy Conclusion Analytics
More informationFacilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. IV (Sep Oct. 2014), PP 18-24 Facilitating Efficient Encrypted Document Storage and Retrieval
More informationRisk based monitoring using integrated clinical development platform
Risk based monitoring using integrated clinical development platform Authors Sita Rama Swamy Peddiboyina Dr. Shailesh Vijay Joshi 1 Abstract Post FDA s final guidance on Risk Based Monitoring, Industry
More informationSOME SECURITY CHALLENGES IN CLOUD COMPUTING. Hoang N.V.
SOME SECURITY CHALLENGES IN CLOUD COMPUTING Hoang N.V. What is cloud computing? Cloud computing: Advantages "pay-per-use model for enabling available, convenient and on-demand network access to a shared
More informationDelivering the power of the world s most successful genomics platform
Delivering the power of the world s most successful genomics platform NextCODE Health is bringing the full power of the world s largest and most successful genomics platform to everyday clinical care NextCODE
More informationMicrosoft Cloud Services and Dynamics CRM Online
Microsoft Cloud Services and Dynamics CRM Online Technical Sales Session September, 2010 Target Audience IT Pro Systems Management Generally against cloud Influence them to see cloud as non-threatening?
More informationDATAOPT SOLUTIONS. What Is Big Data?
DATAOPT SOLUTIONS What Is Big Data? WHAT IS BIG DATA? It s more than just large amounts of data, though that s definitely one component. The more interesting dimension is about the types of data. So Big
More informationPrivacy-Preserving Distributed Encrypted Data Storage and Retrieval
Privacy-Preserving Distributed Encrypted Data Storage and Retrieval Sibi Antony Master Thesis Starting Talk WS12/13 1 Overview Motivation Thesis Goals Methodology Initial Analysis Time Table 2 Motivation
More informationPrivacy-Preserving Data Exploration in Genome-Wide Association Studies
Privacy-Preserving Data Exploration in Genome-Wide Association Studies Aaron Johnson U.S. Naval Research Laboratory aaron.m.johnson@nrl.navy.mil Vitaly Shmatikov The University of Texas at Austin shmat@cs.utexas.edu
More informationHow To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)
JJT-029-2015 SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD P.Vidyasagar, R.Karthikeyan, Dr.C.Nalini M.Tech Student, Dept of CSE,Bharath University, Email.Id: vsagarp@rediffmail.com
More informationInternational Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS
PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, chittiprolumounika@gmail.com; Third C.
More informationWhy SAAS makes sense: The benefits of Cloud Computing for Email Archiving
Why SAAS makes sense: The benefits of Cloud Computing for Email Archiving Confidentiality This document contains confidential material that is proprietary to Gradian Systems Ltd. The material, ideas, and
More informationUnderstanding Vendor Risk And Analyzing the SSAE No. 16
Understanding Vendor Risk And Analyzing the SSAE No. 16 Accelerate your Credit Union s Performance June 19, 2014 AUSTIN, TEXAS www.cuaccelerator.com Agenda Vendor Management Key Outsourcing Risk Areas
More informationBig Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
More informationAmmar Alkassar Sirrix AG Trusted Clouds: Chances for Security, Resilience and Scalability
More information
Training for de-identifying human subjects data for sharing: a viable library service
Training for de-identifying human subjects data for sharing: a viable library service David S. Fearon JHU Data Management Services Jennifer Darragh Sheridan Library GIS & Data Services Johns Hopkins University
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationPRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH
PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH FOC2015 Vienna / 17.06.2015 Challenges for Future ICT Systems Cloud computing
More informationA Multi-locus Genetic Risk Score for Abdominal Aortic Aneurysm
A Multi-locus Genetic Risk Score for Abdominal Aortic Aneurysm Zi Ye, 1 MD, Erin Austin, 1,2 PhD, Daniel J Schaid, 2 PhD, Iftikhar J. Kullo, 1 MD Affiliations: 1 Division of Cardiovascular Diseases and
More informationAnonymization of Administrative Billing Codes with Repeated Diagnoses Through Censoring
Anonymization of Administrative Billing Codes with Repeated Diagnoses Through Censoring Acar Tamersoy, Grigorios Loukides PhD, Joshua C. Denny MD MS, and Bradley Malin PhD Department of Biomedical Informatics,
More informationMulti-Factor Authentication: All in This Together
Multi-Factor Authentication: All in This Together Host: Tom Barton, University of Chicago Speakers: IAM Online September 11, 2013 Eric Goodman, University of California Office of the President Mike Grady,
More informationNetwork Communications System. Redefining Intelligent Utility Communications
Network Communications System Redefining Intelligent Utility Communications Technology that takes you from today to tomorrow. FlexNet Technology you can trust FlexNet is a robust, high-powered solution
More informationJune 5, 2013 Ken Klingenstein. Identity Management, the Cloud, NSTIC and Accessibility
June 5, 2013 Ken Klingenstein Identity Management, the Cloud, NSTIC and Accessibility Identity Management, the Cloud, NSTIC and Accessibility Contents Internet Identity Today Two types of cloud use cases
More information