English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 109952/140887 (78%)
Visitors : 46352310      Online Users : 334
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/57581
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/57581


    Title: 在語意式雲端環境上資料交換的保護 -以醫療病例為例
    Data exchange protection in the semantic data cloud-medical health record as an example
    Authors: 黃雅玲
    Huang, Ya Ling
    Contributors: 胡毓忠
    Hu, Yuh Jong
    黃雅玲
    Huang, Ya Ling
    Keywords: 語意網
    資料交換
    雜湊函數
    Date: 2012
    Issue Date: 2013-04-01 14:39:07 (UTC+8)
    Abstract: 近年來,隨著網路資訊的普及和個人隱私意識的提升,個人識別資料的分享和保護已經變成重要網路研究議題之ㄧ。資料存放在雲端環境上,因不同資料來源之間結構上的差異,我們將會面臨到如何建立PII的分享和保護準則,以確保滿足資料擁有者的隱私偏好。
    本研究使用雲端運算做為多個資料源執行資料交換的環境,其好處在於擁有大量的網路存放空間、大幅降低了資料管理成本。舉例來說,我們可在雲端環境上存放大量的醫療資料,當使用者欲查詢不同來源的醫療資料時,可透過資料交換的方式從單一入口取得,不需兩端分別進行查詢,並利用雜湊函數的方式來處理個人資料匿名性的辨識,主要是在不揭露個人資料的狀況下,仍然可以判斷資料是否為同一筆資料。
    另外,由於本研究以個人隱私資料做為研究之情境,所以在隱私保護上會以存取控管規範(Access Control Policy,ACP)、資料處理規範(Data Handling Policy,DHP)和資料釋放規範(Data Release Policy,DRP),三種規範來說明資料保護、資料交換和資料揭露的過程。
    最後,本研究主要是使用具有語意化技術本體論和規則的知識表達來解決跨資料源的資料交換,除了理論塑模之外並且利用兩家醫院的情境來加以展示。
    Personal Identifiable Information (PII) sharing and protection have become one of the most important research issues for the Internet, especially for cloud computing infrastructure because of its widespread services. The challenge of sharing structured PII data in the cloud is to address the structure differences between data sources. In addition, we face the problem for how to establish the PII sharing and protection principles to ensure that its disclosure criteria are satisfied with the data owners` privacy policies.
    In this study, we use cloud computing simulated environment as a multiple data sources exchange platform because of its spacious and cost-effective reasons. For example, we can outsource tremendous amount of electronic health record (EHR) administration services in the cloud without too much cost. Besides, data exchange provides a single point of data access instead of having accessed in a separate entry. We apply hash function of de-identifiable partial PII to enable record linkage services between data sources for data exchange without losing data owners` privacy.
    Three types of privacy protection policies are proposed to achieve the data exchange and protection objectives in the multiple sources data cloud. They are Access Control Policy (ACP), Data Handling Policy (DHP), and Data Releasing Policy (DRP). These policies are represented as OWL-based ontologies and enforced as Logic-Program (LP)-based rules. We demonstrate the privacy protection policy concepts for medical record exchange between two hospitals.
    Reference: [1] Eberhart, A. et al., "Semantic Technologies and Cloud Computing." In Foundations for the Web of Information and Services, Fensel, D., Ed.; Springer, 2011, pp. 239–251.
    [2] 新北市政府資訊中心,新北市打造雲端檔案櫃省紙減碳節省公帑千萬,2012
    http://www.imc.ntpc.gov.tw/web/News?command=showDetail&postId=262250
    [3] Bill Claybrook. "Differences Explained: Private vs. Public vs. Hybrid Cloud Computing." Sponsored by: HP & INTEL, 2011.
    [4] R. Fagin , et al.," Data Exchange: Semantics and Query Answering", Lecture Notes in Computer Science, vol.2572, pp.207-224, 2003.
    [5] A. Hernich, et al.," Logic and Data Exchange: Which Solutions Are “Good” Solutions?", Lecture Notes in Computer Science, vol.6006,pp.61-85, 2010.
    [6] A. Y. Levy, et al., "Querying Heterogeneous Information Sources Using Source Descriptions," Presented at the Proceedings of the 22th International Conference on Very Large Data Bases, 1996.
    [7] R. Herold, "European Union (EU) Data Protection Directive of 1995 Frequently Asked Questions " Computer Security Institute,2002.
    [8] R. Popp, et al.," Countering Terrorism Through Information and Privacy Protection Technologies", IEEE Security and Privac, vol.4,pp.18-27, 2006.
    [9] V. Ciriani, S. Capitani di Vimercati, et al., "Microdata Protection," in Secure Data Management in Decentralized Systems. vol. 33, 2007, pp. 291-321.
    [10] L. Sweeney, et al.," k-Anonymity: A Model for Protecting Privacy", International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,vol.10,pp.557-570,2002.
    [11] D. Calvanese and G. D. Giacomo, "Data Integration: A Logic-Based Perspective," AI Magazine, vol. 26, pp. 59-70, 2005.
    [12] Y. Kalfoglou and M. Schorlemmer, "Ontology Mapping: The State of The Art", The Knowledge Engineering Review, vol. 18, pp. 1-31, 2003.
    [13] J. Euzenat and P. Valtchev, "Similarity-Based Ontology Alignment in OWL-Lite", ECAI , 2004.
    [14] N. F. Noy and M. A. Musen, "The PROMPT Suite: Interactive Tools for Ontology Merging and Mapping," International Journal of Human-Computer Studies, vol. 59, pp. 983-1024, 2003.
    [15] R.L.Rivest.," The MD5 message digest algorithm ", RFC 1321, 1992.
    [16] L. Sweeney, "Achieving k-anonymity privacy protection using generalization and suppression." International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002.
    [17] 鄭國平, "雲端委外語意式資料保護," 碩士, 資訊科學學系,國立政治大學,2013.
    [18] C.A. Ardagna, et al., "A Privacy-Aware Access Control System∗," J. Comput. Secur., vol. 16, pp. 369-397, 2008.
    [19] C. A. Ardagna, J. Camenisch, et al., "Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project," J. Comput. Secur., vol. 18, pp. 123-160, 2010.
    [20] Ian Horrocks, Peter F. Patel-Schneider, Harold Boley, Said Tabet , Benjamin Grosof , Mike Mike Mike Dean(2004). ”SWRL: A Semantic Web Rule Language Combining OWL and RuleML”,
    http://www.w3.org/Submission/SWRL/
    [21] OECD定義Quasi-identifiers
    http://stats.oecd.org/glossary/detail.asp?ID=6961
    [22] 楊竣展, "整合資料在雲端環境上的分享與隱私保護-以電子病歷資料為例," 碩士, 資訊科學學系,國立政治大學,2011.
    [23] J. Mateo-Sanz, A. Martínez-Ballesté, et al., "Fast Generation of Accurate Synthetic Microdata," in Privacy in Statistical Databases. vol. 3050, 2004, pp. 298-306.
    [24] Knublauch, H., M. A. Musen, and A. L. Rector(2004). “Editing description logics ontologies with the Protégé OWL plugin”, International Workshop on Description Logics., Vol.104.
    Description: 碩士
    國立政治大學
    資訊科學學系
    99753026
    101
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0099753026
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File SizeFormat
    302601.pdf1919KbAdobe PDF2999View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback