In this paper, the secure BioSemantic Scheme is
presented to bridge biological/biomedical research problems and
computational solutions via semantic computing. Due to the diversity
of problems in various research fields, the semantic capability
description language (SCDL) plays and important role as a common
language and generic form for problem formalization. SCDL is
expected the essential for future semantic and logical computing in
Biosemantic field. We show several example to Biomedical problems
in this paper. Moreover, in the coming age of cloud computing, the
security problem is considered to be crucial issue and we presented a
practical scheme to cope with this problem.
[1] B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, “Private
information retrieval,” Proc. of 36th FOCS, 1995, pp. 41-50, 1995.
[2] B. Chor and N. Gilboa, “Computationally private information retrieval,”
Proc. of 29th STOC, 1997, pp. 304-313, 1997.
[3] S. Tsujii, H. Yamaguchi, and T. Morizumi, “Proposal on concept of
encryption theory based on logic -Toward realization of confidentiality
preserving retrieval and creation of answer by natural language-,” SCIS
2013,
[4] S. Tsujii, H. Yamaguchi and T. Morizumi, “Proposal on concept of
encrypted state processing at semantic layer -Toward realization of
confidentiality preserving retrieval and creation of answer by natural
language-”, ISEC 2012 Technical Report, 2012.
[5] K. Chida, K. Hamada, D. Ikarashi, and K. Takahashi, “A three-party
secure function evaluation with lightweight verifiability revisited,”
CSS2010, 2010.
[6] S. Wang, R.-M. Hu, H. C. W. Hsiao, D. A. Hecht, K.-L. Ng, R.-M. Chen,
P. C.-Y. Sheu, and J. J. P. Tsai, “Using SCDL for integrating tools and
data for complex biomedical applications,” International Journal of
Semantic Computing, 2(2), pp, 291-308, June 2008.
[7] R. Crammer, R. Gennaro, and B. Shoenmakers, “A secure and optimally
efficient multi-authority election scheme,” Advances in Cryptology
-EUROCRYPT’97, LNCS1233. pp. 103-118, 1997.
[8] A. Shamir, “How to share a secret,” Communication of the ACM, 22(11),
pp. 612-613, 1979.
[9] P. C.-Y. Sheu and A. Kitazawa, “From Semantic Objects to Semantic
Software Engineering,” International Journal of Semantic Computing,
1(1), pp. 11-28, 2007.
[10] F. Sanger, S. Nicklen, and A. R. Coulson, “DNA sequencing with
chain-terminating inhibitors,” Proc. Natl. Acd. Sci. USA, 74(12), pp.
5463-5467, 1977.
[11] P. H. Sellers, “Pattern recognition in genetic sequences,” Proc. Natl. Acd.
Sci. USA, 76(7), p. 3041, 1979.
[12] A. Sepulveda, M. Pieber, M. A. Soto, and J. C. Toha, “Storage and
retrieval of biomolecule sequences,” K/ Theor. Biol. 103(2) pp. 331-332,
1983.
[13] H. Peltola, H. Söderlund, and E. Ukkonen, “Algorithms for the search of
amino acid patterns in nucleic acid sequences,” Nucleic Acids Research,
14(1), pp.99-107, 1986.
[14] P. Gilna, L. J. Tomlinson, and C. Burks, “Submission of nucleotide
sequence data to GenBank,” Journal of General Microbiology, 135(7), pp.
1779-1786, 1989.
[15] W. R. Pearson and W. Miller, “Dynamic programming algorithms for
biological sequence comparison,” Methods in Enzymology, 210, pp.
575-601, 1992.
[16] J. Gollub, C. A. Ball, and G. Sherlock, “The Stanford Microarray
Database: a user’s guide,” Methods in Molecular Biology, 338, pp.
191-208, 2006.
[17] O. Langella, M. Zivy, and J. Joets, “The PROTICdb database for 2-DE
proteomics,” Methods in Molecular Biology, 355, pp. 279-303, 2007.
[1] B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, “Private
information retrieval,” Proc. of 36th FOCS, 1995, pp. 41-50, 1995.
[2] B. Chor and N. Gilboa, “Computationally private information retrieval,”
Proc. of 29th STOC, 1997, pp. 304-313, 1997.
[3] S. Tsujii, H. Yamaguchi, and T. Morizumi, “Proposal on concept of
encryption theory based on logic -Toward realization of confidentiality
preserving retrieval and creation of answer by natural language-,” SCIS
2013,
[4] S. Tsujii, H. Yamaguchi and T. Morizumi, “Proposal on concept of
encrypted state processing at semantic layer -Toward realization of
confidentiality preserving retrieval and creation of answer by natural
language-”, ISEC 2012 Technical Report, 2012.
[5] K. Chida, K. Hamada, D. Ikarashi, and K. Takahashi, “A three-party
secure function evaluation with lightweight verifiability revisited,”
CSS2010, 2010.
[6] S. Wang, R.-M. Hu, H. C. W. Hsiao, D. A. Hecht, K.-L. Ng, R.-M. Chen,
P. C.-Y. Sheu, and J. J. P. Tsai, “Using SCDL for integrating tools and
data for complex biomedical applications,” International Journal of
Semantic Computing, 2(2), pp, 291-308, June 2008.
[7] R. Crammer, R. Gennaro, and B. Shoenmakers, “A secure and optimally
efficient multi-authority election scheme,” Advances in Cryptology
-EUROCRYPT’97, LNCS1233. pp. 103-118, 1997.
[8] A. Shamir, “How to share a secret,” Communication of the ACM, 22(11),
pp. 612-613, 1979.
[9] P. C.-Y. Sheu and A. Kitazawa, “From Semantic Objects to Semantic
Software Engineering,” International Journal of Semantic Computing,
1(1), pp. 11-28, 2007.
[10] F. Sanger, S. Nicklen, and A. R. Coulson, “DNA sequencing with
chain-terminating inhibitors,” Proc. Natl. Acd. Sci. USA, 74(12), pp.
5463-5467, 1977.
[11] P. H. Sellers, “Pattern recognition in genetic sequences,” Proc. Natl. Acd.
Sci. USA, 76(7), p. 3041, 1979.
[12] A. Sepulveda, M. Pieber, M. A. Soto, and J. C. Toha, “Storage and
retrieval of biomolecule sequences,” K/ Theor. Biol. 103(2) pp. 331-332,
1983.
[13] H. Peltola, H. Söderlund, and E. Ukkonen, “Algorithms for the search of
amino acid patterns in nucleic acid sequences,” Nucleic Acids Research,
14(1), pp.99-107, 1986.
[14] P. Gilna, L. J. Tomlinson, and C. Burks, “Submission of nucleotide
sequence data to GenBank,” Journal of General Microbiology, 135(7), pp.
1779-1786, 1989.
[15] W. R. Pearson and W. Miller, “Dynamic programming algorithms for
biological sequence comparison,” Methods in Enzymology, 210, pp.
575-601, 1992.
[16] J. Gollub, C. A. Ball, and G. Sherlock, “The Stanford Microarray
Database: a user’s guide,” Methods in Molecular Biology, 338, pp.
191-208, 2006.
[17] O. Langella, M. Zivy, and J. Joets, “The PROTICdb database for 2-DE
proteomics,” Methods in Molecular Biology, 355, pp. 279-303, 2007.
@article{"International Journal of Information, Control and Computer Sciences:70652", author = "Hiroshi Yamaguchi and Phillip C.-Y. Sheu and Ryo Fujita and Shigeo Tsujii", title = "Secure Bio Semantic Computing Scheme", abstract = "In this paper, the secure BioSemantic Scheme is
presented to bridge biological/biomedical research problems and
computational solutions via semantic computing. Due to the diversity
of problems in various research fields, the semantic capability
description language (SCDL) plays and important role as a common
language and generic form for problem formalization. SCDL is
expected the essential for future semantic and logical computing in
Biosemantic field. We show several example to Biomedical problems
in this paper. Moreover, in the coming age of cloud computing, the
security problem is considered to be crucial issue and we presented a
practical scheme to cope with this problem.", keywords = "Biomedical applications, private information
retrieval (PIR), semantic capability description language (SCDL),
semantic computing.", volume = "9", number = "7", pages = "1714-5", }