Secure Bio Semantic Computing Scheme

In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.




References:
[1] B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, “Private
information retrieval,” Proc. of 36th FOCS, 1995, pp. 41-50, 1995.
[2] B. Chor and N. Gilboa, “Computationally private information retrieval,”
Proc. of 29th STOC, 1997, pp. 304-313, 1997.
[3] S. Tsujii, H. Yamaguchi, and T. Morizumi, “Proposal on concept of
encryption theory based on logic -Toward realization of confidentiality
preserving retrieval and creation of answer by natural language-,” SCIS
2013,
[4] S. Tsujii, H. Yamaguchi and T. Morizumi, “Proposal on concept of
encrypted state processing at semantic layer -Toward realization of
confidentiality preserving retrieval and creation of answer by natural
language-”, ISEC 2012 Technical Report, 2012.
[5] K. Chida, K. Hamada, D. Ikarashi, and K. Takahashi, “A three-party
secure function evaluation with lightweight verifiability revisited,”
CSS2010, 2010.
[6] S. Wang, R.-M. Hu, H. C. W. Hsiao, D. A. Hecht, K.-L. Ng, R.-M. Chen,
P. C.-Y. Sheu, and J. J. P. Tsai, “Using SCDL for integrating tools and
data for complex biomedical applications,” International Journal of
Semantic Computing, 2(2), pp, 291-308, June 2008.
[7] R. Crammer, R. Gennaro, and B. Shoenmakers, “A secure and optimally
efficient multi-authority election scheme,” Advances in Cryptology
-EUROCRYPT’97, LNCS1233. pp. 103-118, 1997.
[8] A. Shamir, “How to share a secret,” Communication of the ACM, 22(11),
pp. 612-613, 1979.
[9] P. C.-Y. Sheu and A. Kitazawa, “From Semantic Objects to Semantic
Software Engineering,” International Journal of Semantic Computing,
1(1), pp. 11-28, 2007.
[10] F. Sanger, S. Nicklen, and A. R. Coulson, “DNA sequencing with
chain-terminating inhibitors,” Proc. Natl. Acd. Sci. USA, 74(12), pp.
5463-5467, 1977.
[11] P. H. Sellers, “Pattern recognition in genetic sequences,” Proc. Natl. Acd.
Sci. USA, 76(7), p. 3041, 1979.
[12] A. Sepulveda, M. Pieber, M. A. Soto, and J. C. Toha, “Storage and
retrieval of biomolecule sequences,” K/ Theor. Biol. 103(2) pp. 331-332,
1983.
[13] H. Peltola, H. Söderlund, and E. Ukkonen, “Algorithms for the search of
amino acid patterns in nucleic acid sequences,” Nucleic Acids Research,
14(1), pp.99-107, 1986.
[14] P. Gilna, L. J. Tomlinson, and C. Burks, “Submission of nucleotide
sequence data to GenBank,” Journal of General Microbiology, 135(7), pp.
1779-1786, 1989.
[15] W. R. Pearson and W. Miller, “Dynamic programming algorithms for
biological sequence comparison,” Methods in Enzymology, 210, pp.
575-601, 1992.
[16] J. Gollub, C. A. Ball, and G. Sherlock, “The Stanford Microarray
Database: a user’s guide,” Methods in Molecular Biology, 338, pp.
191-208, 2006.
[17] O. Langella, M. Zivy, and J. Joets, “The PROTICdb database for 2-DE
proteomics,” Methods in Molecular Biology, 355, pp. 279-303, 2007.