Presentation 2011-02-28
Realization of both Protection and Utilization of the Personal Information in the Medical/Care Network
Hiroshi YAMAGUCHI, Kohtaro TADAKI, Shigeo TSUJII, Norihisa DOI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) On consignment from the Ministry of Economy, Trade and Industry, our research group at Chuo University develops the technology which enables us to utilize the personal information while preserving the privacy. We resolve the conflict between the protection and utilization of the personal information, based on modern cryptographic technology such as cryptographic protocols and public key cryptosystems. In particular, we focus on the medical/care network as a typical example in such a conflict, and develop a system which satisfies the following two conflicting requirements: (i) To achieve a feeling of trust and security among the patients to the medical/care network by ensuring the privacy protection, (ii) To improve the medical/care services by making effective use of the personal information such as the medical/care history. In this paper, we explain the aim and method of our research and development.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Privacy Protection / Personal Information / Medical/Care Network / Cryptographic Protocol / Data Mining / Public Key Cryptosystem / Cloud Computing
Paper # SITE2010-52,IA2010-88
Date of Issue

Conference Information
Committee SITE
Conference Date 2011/2/21(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Realization of both Protection and Utilization of the Personal Information in the Medical/Care Network
Sub Title (in English)
Keyword(1) Privacy Protection
Keyword(2) Personal Information
Keyword(3) Medical/Care Network
Keyword(4) Cryptographic Protocol
Keyword(5) Data Mining
Keyword(6) Public Key Cryptosystem
Keyword(7) Cloud Computing
1st Author's Name Hiroshi YAMAGUCHI
1st Author's Affiliation Research and Development Initiative, Chuo University()
2nd Author's Name Kohtaro TADAKI
2nd Author's Affiliation Research and Development Initiative, Chuo University
3rd Author's Name Shigeo TSUJII
3rd Author's Affiliation Research and Development Initiative, Chuo University
4th Author's Name Norihisa DOI
4th Author's Affiliation Research and Development Initiative, Chuo University
Date 2011-02-28
Paper # SITE2010-52,IA2010-88
Volume (vol) vol.110
Number (no) 429
Page pp.pp.-
#Pages 6
Date of Issue