We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Privacy Preservation in Big Data using K-Anonymity Algorithm with Privacy Key

by Amit Kumar Gupta, Neeraj Shukla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 153 - Number 5
Year of Publication: 2016
Authors: Amit Kumar Gupta, Neeraj Shukla
10.5120/ijca2016912056

Amit Kumar Gupta, Neeraj Shukla . Privacy Preservation in Big Data using K-Anonymity Algorithm with Privacy Key. International Journal of Computer Applications. 153, 5 ( Nov 2016), 25-30. DOI=10.5120/ijca2016912056

@article{ 10.5120/ijca2016912056,
author = { Amit Kumar Gupta, Neeraj Shukla },
title = { Privacy Preservation in Big Data using K-Anonymity Algorithm with Privacy Key },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 153 },
number = { 5 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume153/number5/26400-2016912056/ },
doi = { 10.5120/ijca2016912056 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:58:20.322290+05:30
%A Amit Kumar Gupta
%A Neeraj Shukla
%T Privacy Preservation in Big Data using K-Anonymity Algorithm with Privacy Key
%J International Journal of Computer Applications
%@ 0975-8887
%V 153
%N 5
%P 25-30
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Big Data is a complex collection of huge amount of data records, everything around us is a source of big data that is too broad and too complex. Big data is generated by traditional data processing applications are inadequate. Many challenges are there in Big Data, they includes analysis of data in big data, capturing of data, data curtain, searching, sharing of data record, storage of data,  data transfer, visualization, querying with database, updation of database and information privacy. Privacy preservation can be managed properly in case of limited amount of data, but in case of huge amount of data that is “Big Data” privacy preservation is a very big issue. Many algorithms are discussed here to solve the privacy preservation issue, generally Anonymization, Notice and Consent, Differential Privacy methods are used to resolve the issue of privacy preservation, each method have its merits and demerits, any method is not fully comfortable to provide required level of privacy having less amount of burden. In this paper there is discussed an advanced k-anonymity algorithm with privacy key, unique key is generated automatically by privacy key generation mechanism at the time of data creation. Then the information is stored in the database with that key, thus, user data is much secure than existing k- anonymity algorithm because of two level of security. The first level is by K-anonymity and the second is by privacy key.

References
  1. Latanya Sweeney “k-Anonymity: A model for protectig data privacy”. School of Computer Science, Carnegie Mellon University, Pittsburgh, USA 2002.
  2. Anjana Gosain, Nikita Chugh “Privacy Preservation in Big Data”USICT, Guru Govind Singh Indraprastha University, Delhi India 2014.
  3. “Security Issues associated with Big Data in Cloud Computing” Venkata Narsimha Inukollu1, Sailja Arsi1, Srinivas Rao Ravuri3, 1Department of Computer Science Engineering, Texas Tech University, USA, 3Department of Banking and financial services, Cognigent Technology Solutions, India.
  4. “Research on privacy preserving on k-anonymity” Yun Pan, Xiao-ling Zhu, Ting-gui Chen, School of Computer Science & Information Engineering, Zhejiang Gongshang University, Hangzhou, China 2012.
  5. Brijesh B. Mehta, Uday Pratap Rao “Big Data Privacy: Issues and Challenges” Computer Science Engineering Department, Sardar Vallabh Bhai National Institute of Technology, Surat.
  6. “An Improved and Efficient Data Privacy in Big data with K-anonymity and alpha Dissociation” Salini S, MTech in CSE Marian Engineering College , Triendram India,Sreetha V Kumar Assistant Professor in CSE,, Marian Engineering College, Trivendram , IndiaNeevan R, Assistant Professor in CSE, College of Engineering Kottarkara Kollam, India.
  7. “Survey Paper on Big Data” Ms. Vibhavari Chavan , Prof Rajesh. N. Phursule.
  8. “Quasi and Sensitive Attribute based Perturbation Technique for Privacy Preservation” , Neha Patel, Prof. Srikant Lade, Prof. Ravindra Kumar Gupta 2015, Department of Computer Science & Engineering RKDF, IST, RGPV, University, Bhopal, India.
  9. “Challenges and Opportunities with Big Data” A Community white paper developed by leading researchers in across the united states.
  10. “Addressing Cloud Computing security issues” Dimitrios Zissis, Dimitrios Lekkas, Department of Product and System design engineering , University of the Aegon, Syros84100, Greece.
Index Terms

Computer Science
Information Sciences

Keywords

Big Data Anonymization Notice and Consent Differential Privacy K-anonymity K-anonymity with privacy key Suppression Generalization etc.