CFP last date
20 December 2024
Reseach Article

Privacy Preserving Big Data publishing- A scalable K-anonymization approach using MapReduce

by Deepika Sharma, Rohit Kumar Singhal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 12
Year of Publication: 2018
Authors: Deepika Sharma, Rohit Kumar Singhal
10.5120/ijca2018917705

Deepika Sharma, Rohit Kumar Singhal . Privacy Preserving Big Data publishing- A scalable K-anonymization approach using MapReduce. International Journal of Computer Applications. 181, 12 ( Aug 2018), 19-23. DOI=10.5120/ijca2018917705

@article{ 10.5120/ijca2018917705,
author = { Deepika Sharma, Rohit Kumar Singhal },
title = { Privacy Preserving Big Data publishing- A scalable K-anonymization approach using MapReduce },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2018 },
volume = { 181 },
number = { 12 },
month = { Aug },
year = { 2018 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number12/29825-2018917705/ },
doi = { 10.5120/ijca2018917705 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:05:48.857928+05:30
%A Deepika Sharma
%A Rohit Kumar Singhal
%T Privacy Preserving Big Data publishing- A scalable K-anonymization approach using MapReduce
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 12
%P 19-23
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Networked data contain interconnected entities for which inferences are to be made. For example, web pages are interconnected by hyperlinks, research papers are associated by references, phone accounts are linked by calls, and conceivable terrorists are linked by communications. Networks have turned out to be ubiquitous. Correspondence networks, financial transaction networks, networks portraying physical systems, and social networks are all ending up noticeably progressively important in our everyday life. Regularly, we are interested in models of how nodes in the system influence each other (for example, who taints whom in an epidemiological system), models for predicting an attribute of intrigue in light of observed attributes of objects in the system. The technique of SVM is applied which will classify the data into malicious and non-malicious. In the previous study authors proposed various model for privacy preserving which are group based records, K-anonymity etc. In the existing models there are various problems like it affect data utilities, harm the data identifiers. In the research work, the hybrid approach has been designed to ensure data privacy which is based on attribute and data identifiers.

References
  1. Youyang Qu, Shui Yu, Longxiang Gao, and Jianwei Niu “Big Data Set Privacy Preserving through Sensitive Attribute-based Grouping” IEEE ICC Communication and Information Systems Security Symposium, 2017.
  2. K. Sree Divya1, P.Bhargavi, S. Jyothi, “Machine Learning Algorithms in Big data Analytics,” International Journal of Computer Sciences and Engineering vol.6 (1), Jan 2018.
  3. M. Mazhar, U. Rathore, “Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks”, Journal of King Saud University Computer and Information Sciences, vol. 27, pp. 305–314, 2015.
  4. Muhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari, Lu Yao, N abin Kumar Karn, F oudil Abdessamia, “Network Traffic Classification Techniques and Comparative Analysis Using Machine Learning Algorithms”, 2016 2nd IEEE International Conference on Computer and Communications, vol. 8, pp. 2451-2455, 2016.
  5. Aboagela Dogman, Reza Saatchi, “Multimedia traffic quality of service management using statistical and artificial intelligence techniques”, The Institution of Engineering and Technology 2014, vol. 8, pp. 367–377, 2014.
  6. Jaiswal Rupesh Chandrakant, Lokhande Shashikant. D., “Machine Learning Based Internet Traffic Recognition with Statistical Approach”, 2013 Annual IEEE India Conference (INDICON), vol. 7, pp. 121-126, 2013.
  7. Uzma Anwar, Ghulam Shabbir, Malik Ahsan Ali, “Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records”, International Journal of Computer Applications (0975 – 8887), vol. 89, pp. 1-7, 2014.
  8. Riyad Alshammari, A. Nur Zincir-Heywood, “Identification of VoIP encrypted traffic using a machine learning approach”, Journal of King Saud University – Computer and Information Sciences, vol. 27, pp. 77–92, 2015.
  9. Seonghoon Moon, Juwan Yoo, and Songkuk Kim. Exploiting Adaptive Multi-interface Selection to Improve QoS and Cost-efficiency of Mobile Video Streaming. IEEE International Conference on Mobile Services, (pp. 134-141), 2015.
  10. I. Martinez-Yelmo, I. Seoane, and C. Guerrero, “Fair QoE measurements related with networking technologies,” WWIC 2010, LNCS 6074, Springer-Verlag Berlin Heidelberg, pp. 228–239, 2010.
  11. M. Afaq, S. U. Rehman, and W. C. Song, “Visualization of elephant flows and qos provisioning in sdn-based networks,” in Network Operations and Management Symposium (APNOMS), 2015 17th Asia-Pacific, pp. 444–447, Aug 2015.
Index Terms

Computer Science
Information Sciences

Keywords

VoIP SVM KNN Intrusions.