CFP last date
20 December 2024
Reseach Article

Big Data – Feasible Solutions for Data Privacy Challenges

by Miti Jhaveri, Resham Gala, Khushali Deulkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 18
Year of Publication: 2015
Authors: Miti Jhaveri, Resham Gala, Khushali Deulkar
10.5120/ijca2015906726

Miti Jhaveri, Resham Gala, Khushali Deulkar . Big Data – Feasible Solutions for Data Privacy Challenges. International Journal of Computer Applications. 127, 18 ( October 2015), 1-4. DOI=10.5120/ijca2015906726

@article{ 10.5120/ijca2015906726,
author = { Miti Jhaveri, Resham Gala, Khushali Deulkar },
title = { Big Data – Feasible Solutions for Data Privacy Challenges },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 18 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number18/22826-2015906726/ },
doi = { 10.5120/ijca2015906726 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:18:19.937237+05:30
%A Miti Jhaveri
%A Resham Gala
%A Khushali Deulkar
%T Big Data – Feasible Solutions for Data Privacy Challenges
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 18
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we aim to introduce the challenges that are faced to maintain the authentication and integrity in big data. Big data was developed to provide voluminous data while protecting the integrity of data. We further provide a comparative study on various methods which can help resolve the following issues. The comparative study is based upon a few parameters such as the scope, its prerequisites, advantages and disadvantages of the method.

References
  1. M. B. Malik, M. A. Ghazi and R. Ali, “Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects”, in proceedings of Third International Conference on Computer and Communication Technology, IEEE 2012.
  2. Y.Demchenko, P.Membrey, P.Grosso, C. de Laat, "Addressing Big Data Issues in Scientific Data Infrastructure," in First International Symposium on Big Data and Data Analytics in Collaboration (BDDAC 2013). Part of The 2013 Int. Conf. on Collaboration Technologies and Systems (CTS 2013), May 20-24, 2013, San Diego, California,USA.
  3. Cloud Security Alliance, "Expanded Top Ten Big Data Security and Privacy Challenges", April 2013.
  4. J. Han, M. Kamber and J. Pei "Data Mining: Concepts and Techniques" 2006, Morgan Kaufmann.
  5. Agarwal, R. and Shrikant, R. "Privacy Preserving Data Mining", Proceeding of Special Interest Group on Management of Dat, pp. 439-450, 2000.
  6. Jian Wang, Yong Cheng Lou, Yen Zh, Jiajin Le, "A Survey on Privacy Preserving Data Mining", International Workshop on Database Technology and Application pp. 111-114, 2009.
  7. P. Samarati, L. Sweeney, "Generalizing Data to Provide Anonymity When Disclosing Information" (Abstract), Proceeding of the 17th ACM-SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, IEEE press, Seattle, June 1998, pp. 188.
  8. A. Machanavajjhala, J. Gehrke, D. Kifer, "L-Diversity: Privacy beyond k-anonymity", Proceeding of the ICDE, Atlanta, Apr. 2006, pp. 24-35.
  9. Ulrich Kohl, Jeffrey Lotspiech, and Stefan Nusser, “Security for the Digital Library – Protectiong Documents Rather Than Channels” in Proceedings of the 9th International Workshop on Database and Expert Systems Applications.
  10. Zhiyuan, An; Haiyan, Liu "Information Technology and Applications (IFITA), 2010 International Forum" on, Issue Date: 16-18 July 2010.
  11. Yu-Yuan Chen, “Architecture for Data-Centric Security”, PhD Thesis, Electrical Engineering Department, Princeton, NJ, Princeton University, pp. 130, 2012.
  12. Jeffrey S. Dwoskin and Ruby B. Lee. Hardware-Rooted Trust for Secure Key Management and Transient Trust. In Proceedings of the 14th ACM Conference on Computer and Communications Security.
  13. Ruby B. Lee, Peter C. S. Kwan, John P. McGregor, Jeffrey Dwoskin, and Zhenghong Wang. Architecture for Protecting Critical Secrets in Microprocessors. In Proceedings of the 32nd Annual International Symposium on Computer Architecture.
  14. OASIS "eXtensible Access Control Markup Language (XACML) Version 2.0, February 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Big Data Privacy Preservation Data Privacy Data Mining Security Solutions.