Skip to main content
Erschienen in:

13.07.2024

A Review of Anonymization Algorithms and Methods in Big Data

verfasst von: Elham Shamsinejad, Touraj Banirostam, Mir Mohsen Pedram, Amir Masoud Rahmani

Erschienen in: Annals of Data Science | Ausgabe 1/2025

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution to this challenge. In this study, we examined various data anonymization methods, including differential privacy, advanced encryption, and strong access controls. In addition, the operation, advantages, disadvantages, and use of these methods, the challenges of adapting these methods to big data, and possible solutions for them were also examined. Our results show that traditional data anonymization methods lack scalability, leading to privacy breaches and data loss. When faced with large volumes of data, these methods may not be able to fully process the data. Also, these methods may be ineffective against re-identification attacks, linkage attacks, and inference attacks. We introduced emerging methods that are capable of providing improved privacy with minimal data loss. These methods have scalability for big data. Finally, we examined future research works and raised important questions that can help improve existing algorithms or develop new methods, better manage the complexity and scale of unstructured data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Olson DL, Shi Y (2007) Introduction to business data mining. McGraw-Hill/Irwin Olson DL, Shi Y (2007) Introduction to business data mining. McGraw-Hill/Irwin
18.
Zurück zum Zitat Shamsinezhad E, Shahbahrami A, Hedayati A, Khadem Zadeh A, Banirostam H (2013) Presentation methods for Task Migration in Cloud Computing by Combination of Yu Router and Post-copy. Int J Comput Sci Issues (IJCSI) 10:98–102 Shamsinezhad E, Shahbahrami A, Hedayati A, Khadem Zadeh A, Banirostam H (2013) Presentation methods for Task Migration in Cloud Computing by Combination of Yu Router and Post-copy. Int J Comput Sci Issues (IJCSI) 10:98–102
19.
20.
Zurück zum Zitat Martinez D, Herrera S (2023) Examining the ethical and legal challenges of Anonymized Data sharing in the era of Big Data Analytics. J Sustainable Technol Infrastructure Plann, 7(5) Martinez D, Herrera S (2023) Examining the ethical and legal challenges of Anonymized Data sharing in the era of Big Data Analytics. J Sustainable Technol Infrastructure Plann, 7(5)
22.
Zurück zum Zitat Banirostam T, Banirostam H, Pedram MM, Rahamni AM (2021) A Review of Fraud Detection Algorithms for Electronic Payment Card transactions. Adv Comput Eng Technol 7:157–166 Banirostam T, Banirostam H, Pedram MM, Rahamni AM (2021) A Review of Fraud Detection Algorithms for Electronic Payment Card transactions. Adv Comput Eng Technol 7:157–166
28.
Zurück zum Zitat Banirostam T, Shamsinejad E, Pedram MM, Rahamni AM (2021) A review of Anonymity algorithms in Big Data. Adv Comput Eng Technol 7:187–196 Banirostam T, Shamsinejad E, Pedram MM, Rahamni AM (2021) A review of Anonymity algorithms in Big Data. Adv Comput Eng Technol 7:187–196
30.
Zurück zum Zitat Puri GD, Haritha D (2023) Implementation of Big Data Privacy Preservation Technique for Electronic Health Records in Multivendor Environment. Int J Adv Comput Sci Appl (IJACSA), 14(2) Puri GD, Haritha D (2023) Implementation of Big Data Privacy Preservation Technique for Electronic Health Records in Multivendor Environment. Int J Adv Comput Sci Appl (IJACSA), 14(2)
33.
Zurück zum Zitat Banirostam H, Banirostam T, Pedram MM, Rahmani AM (2023) Providing and evaluating a Comprehensive Model for detecting Fraudulent Electronic Payment Card transactions with a two-level Filter based on Flow Processing in Big Data. Springer: Int J Inform Technol, 15, Page 4161–4166 01 Sep 2023. Banirostam H, Banirostam T, Pedram MM, Rahmani AM (2023) Providing and evaluating a Comprehensive Model for detecting Fraudulent Electronic Payment Card transactions with a two-level Filter based on Flow Processing in Big Data. Springer: Int J Inform Technol, 15, Page 4161–4166 01 Sep 2023.
38.
Zurück zum Zitat Banirostam H, Shamsinezhad E, Banirostam T Functional Control of Users by Biometric Behavior Features in Cloud Computing. In 2013 4th International Conference on Intelligent Systems, Modelling and Simulation (pp. 94–98). [DOI: 10.1109/ISMS.2013 Banirostam H, Shamsinezhad E, Banirostam T Functional Control of Users by Biometric Behavior Features in Cloud Computing. In 2013 4th International Conference on Intelligent Systems, Modelling and Simulation (pp. 94–98). [DOI: 10.1109/ISMS.2013
39.
Zurück zum Zitat Banirostam H, Hedayati A, Khadem Zadeh A, Shamsinezhad E (2013) A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure. In UKSim 15th International Conference on Computer Modeling and Simulation (pp. 717–721). https://doi.org/10.1109/UKSim.2013.39 Banirostam H, Hedayati A, Khadem Zadeh A, Shamsinezhad E (2013) A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure. In UKSim 15th International Conference on Computer Modeling and Simulation (pp. 717–721). https://​doi.​org/​10.​1109/​UKSim.​2013.​39
Metadaten
Titel
A Review of Anonymization Algorithms and Methods in Big Data
verfasst von
Elham Shamsinejad
Touraj Banirostam
Mir Mohsen Pedram
Amir Masoud Rahmani
Publikationsdatum
13.07.2024
Verlag
Springer Berlin Heidelberg
Erschienen in
Annals of Data Science / Ausgabe 1/2025
Print ISSN: 2198-5804
Elektronische ISSN: 2198-5812
DOI
https://doi.org/10.1007/s40745-024-00557-w