CFP last date
20 December 2024
Reseach Article

Privacy Preservation in Big Data

by Anjana Gosain, Nikita Chugh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 17
Year of Publication: 2014
Authors: Anjana Gosain, Nikita Chugh
10.5120/17619-8322

Anjana Gosain, Nikita Chugh . Privacy Preservation in Big Data. International Journal of Computer Applications. 100, 17 ( August 2014), 44-47. DOI=10.5120/17619-8322

@article{ 10.5120/17619-8322,
author = { Anjana Gosain, Nikita Chugh },
title = { Privacy Preservation in Big Data },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 17 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 44-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number17/17619-8322/ },
doi = { 10.5120/17619-8322 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:30:14.090387+05:30
%A Anjana Gosain
%A Nikita Chugh
%T Privacy Preservation in Big Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 17
%P 44-47
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Big data has brought a revolution in the world of data analytics. Data that was discarded a few years back is now considered a powerful asset. Big data is now being extensively used for knowledge discovery by all sectors of society. It is produced by almost all digital processes and is stored, shared on web. This reliance of big data on web model poses serious security concerns. Traditional security methods cannot be applied to big data due to its large volume, variety and volume. Also since big data contains person specific information, privacy is a major security concern. The three important privacy preservation methods are: data anonymization, notice and consent and differential privacy. In this paper we discuss these privacy preservation methods for big data and how differential privacy is a better solution for big data privacy.

References
  1. X. Zhang, C. Liu, S. Nepal, C. Yang, J. Chen, "Privacy Preservation over Big Data in Cloud Systems," Security, Privacy and Trust in Cloud Systems, pp 239-257, Springer.
  2. M. V. Dijk, A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing," Proceedings of the 5th USENIX conference on Hot topics in security, August 10, 2010, pp. 1-8.
  3. J. Sedayao, "Enhancing cloud security using data anonymization", White Paper, Intel Coporation.
  4. L. Sweeney, "k-anonymity: A model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, pp. 557–570, 2002.
  5. N. Li, T. Li, S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, " IEEE 23rd International Conference on Data Engineering, 2007, pp. 106 - 115.
  6. F. H. Cate, V. M. Schönberger, "Notice and Consent in a World of Big Data," Microsoft Global Privacy Summit Summary Report and Outcomes, Nov 2012.
  7. J. Salido, "Differential privacy for everyone," White Paper, Microsoft Coproration, 2012.
  8. S. Sagiroglu and D. Sinanc, "Big Data: A Review," Proc. International Conference on Collaboration Technologies and Systems, 2013, pp. 42- 47
  9. Y. Demchenko, P. Grzsso, C. De Laat, P. Membrey, "Addressing Big Data Issues in Scientific Data Infrastructure," Proc. International Conference on Collaboration Technologies and Systems, 2013, pp. 48- 55.
  10. Top Ten Big Data Security and Privacy Challenges, Technical report, Cloud Security Alliance, November 2012
  11. S. H. Kim, N. U. Kim, T. M. Chung, "Attribute Relationship Evaluation Methodology for Big Data Security," Proc. International Conference on IT Convergence and Security (ICITCS), 2013, pp. 1-4.
  12. S. H. Kim, J. H. Eom, T. M. Chung, "Big Data Security Hardening Methodology Using Attributes Relationship," Proc. International Conference on Information Science and Applications (ICISA), 2013, pp. 1-2.
  13. Big Data Privacy Preservation, Ericsson Labs, http://labs. ericsson. com/blog/privacy-preservation-in-big-data-analytics
  14. P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and cell suppression," Technical report, SRI International, 1998.
  15. O. Heffetz and K. Ligett, "Privacy and data-based research," NBER Working Paper, September 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Big data Data privacy Anonymization Differential privacy Notice and consent