Skip to main content

2018 | OriginalPaper | Buchkapitel

Privacy Preserving for Big Data Based on Fuzzy Set

verfasst von : Jun Wu, Chunzhi Wang

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Today Big Data is one of the major technology usages for every research areas in competitive world. There are many important aspects with Big Data which would be volume, velocity, variety and veracity. Furthermore it is necessary to optimize existing methods to be executable for privacy preserving of Big Data. In this paper, firstly analysis about Big Data and its associated privacy Preserving, then makes an overview of privacy preservation especially for the Location Privacy Data. Furthermore it proposes model for privacy preserving, and then gives formulation about the algorithm of Privacy Preserving Based on Fuzzy Set (PPFS) which can help to achieve privacy preserving.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Baruh, L., Popescu, M.: Big data analytics and the limits of privacy self-management. New Media Soc. 1, 11–24 (2015) Baruh, L., Popescu, M.: Big data analytics and the limits of privacy self-management. New Media Soc. 1, 11–24 (2015)
2.
Zurück zum Zitat Goroff, D., Polonetsky, J., Tene, O.: Privacy protective research: facilitating ethically responsible access to administrative data. Ann. Am. Acad. Polit. Soc. Sci. 675(1), 46–66 (2018)CrossRef Goroff, D., Polonetsky, J., Tene, O.: Privacy protective research: facilitating ethically responsible access to administrative data. Ann. Am. Acad. Polit. Soc. Sci. 675(1), 46–66 (2018)CrossRef
3.
Zurück zum Zitat Madaan, N., Ahad, M.A., Sastry, S.M.: Data integration in IoT ecosystem: information linkage as a privacy threat. Comput. Law Secur. Rev. 34, 125–133 (2017)CrossRef Madaan, N., Ahad, M.A., Sastry, S.M.: Data integration in IoT ecosystem: information linkage as a privacy threat. Comput. Law Secur. Rev. 34, 125–133 (2017)CrossRef
4.
Zurück zum Zitat Weichert, T.: Health privacy in the age of digital networks. Bundesgesundheitsblatt - Gesundheitsforschung – Gesundheitsschutz, pp. 1–6 (2018) Weichert, T.: Health privacy in the age of digital networks. Bundesgesundheitsblatt - Gesundheitsforschung – Gesundheitsschutz, pp. 1–6 (2018)
5.
Zurück zum Zitat Salah, K.P., Calyam, P., Boutaba, R.: Analytical model for elastic scaling of cloud-based firewalls. IEEE Trans. Netw. Serv. Manag. 14(1), 136–146 (2017)CrossRef Salah, K.P., Calyam, P., Boutaba, R.: Analytical model for elastic scaling of cloud-based firewalls. IEEE Trans. Netw. Serv. Manag. 14(1), 136–146 (2017)CrossRef
6.
Zurück zum Zitat Wu, L., et al.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener. Comput. Syst. 73(C), 22–31 (2017)CrossRef Wu, L., et al.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener. Comput. Syst. 73(C), 22–31 (2017)CrossRef
7.
Zurück zum Zitat Mollah, M.B., Vasilakos, A., Vasilakos, A.: Security and Privacy Challenges in Mobile Cloud Computing. Academic Press Ltd., Cambridge (2017) Mollah, M.B., Vasilakos, A., Vasilakos, A.: Security and Privacy Challenges in Mobile Cloud Computing. Academic Press Ltd., Cambridge (2017)
8.
Zurück zum Zitat Yu, J., Wang, H.: Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 12(8), 1931–1940 (2017)CrossRef Yu, J., Wang, H.: Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 12(8), 1931–1940 (2017)CrossRef
9.
Zurück zum Zitat Li, Y., et al.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387(C), 103–115 (2016) Li, Y., et al.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387(C), 103–115 (2016)
10.
Zurück zum Zitat Moor, D., et al.: Investigative response modeling and predictive data collection. eCrime Researchers Summit, pp. 1–6. IEEE (2013) Moor, D., et al.: Investigative response modeling and predictive data collection. eCrime Researchers Summit, pp. 1–6. IEEE (2013)
11.
Zurück zum Zitat Wald, R., Khoshgoftaar, T., Sumner, C.: Machine prediction of personality from Facebook profiles. In: IEEE International Conference on Information Reuse and Integration, pp. 109–115 (2012) Wald, R., Khoshgoftaar, T., Sumner, C.: Machine prediction of personality from Facebook profiles. In: IEEE International Conference on Information Reuse and Integration, pp. 109–115 (2012)
12.
Zurück zum Zitat Ayhan, S., et al.: Predictive analytics with aviation big data. 54(9), 1–13 (2013) Ayhan, S., et al.: Predictive analytics with aviation big data. 54(9), 1–13 (2013)
13.
Zurück zum Zitat Bradford, R.B.: Use of latent semantic indexing to identify name variants in large data collections. In: IEEE International Conference on Intelligence and Security Informatics, pp. 27–32 (2013) Bradford, R.B.: Use of latent semantic indexing to identify name variants in large data collections. In: IEEE International Conference on Intelligence and Security Informatics, pp. 27–32 (2013)
14.
Zurück zum Zitat Bravo-Marquez, F., Mendoza, M., Poblete, B.: Meta-level sentiment models for big social data analysis. Knowl.-Based Syst. 69, 86–99 (2014)CrossRef Bravo-Marquez, F., Mendoza, M., Poblete, B.: Meta-level sentiment models for big social data analysis. Knowl.-Based Syst. 69, 86–99 (2014)CrossRef
15.
Zurück zum Zitat Zhang, Q., Yang, L.T., Chen, Z.: Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65(5), 1351–1362 (2016)MathSciNetCrossRef Zhang, Q., Yang, L.T., Chen, Z.: Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65(5), 1351–1362 (2016)MathSciNetCrossRef
16.
Zurück zum Zitat Sadhya, D., Singh, S.K., Chakraborty, B.: Review of key-binding-based biometric data preserving schemes. Iet. Biometrics 5(4), 263–275 (2016) Sadhya, D., Singh, S.K., Chakraborty, B.: Review of key-binding-based biometric data preserving schemes. Iet. Biometrics 5(4), 263–275 (2016)
17.
Zurück zum Zitat Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRef Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRef
18.
Zurück zum Zitat Baek, J., Vu, Q., Liu, K., Huang, X., Xiang, Y.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)CrossRef Baek, J., Vu, Q., Liu, K., Huang, X., Xiang, Y.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)CrossRef
19.
Zurück zum Zitat Gai, K., Qiu, M., Zhao, H.: Security-aware efficient mass distributed storage approach for cloud systems in big data. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 140–145. IEEE, New York (2016) Gai, K., Qiu, M., Zhao, H.: Security-aware efficient mass distributed storage approach for cloud systems in big data. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 140–145. IEEE, New York (2016)
20.
Zurück zum Zitat Gai, K., Qiu, M., Zhao, H., Dai, W.: Anti-counterfeit schema using monte carlo simulation for e-commerce in cloud systems. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, pp. 74–79. IEEE, New York (2015) Gai, K., Qiu, M., Zhao, H., Dai, W.: Anti-counterfeit schema using monte carlo simulation for e-commerce in cloud systems. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, pp. 74–79. IEEE, New York (2015)
21.
Zurück zum Zitat Xing, K., et al.: Mutual privacy preserving k-means clustering in social participatory sensing. IEEE Trans. Indust. Informat. PP(99), 1 (2017) Xing, K., et al.: Mutual privacy preserving k-means clustering in social participatory sensing. IEEE Trans. Indust. Informat. PP(99), 1 (2017)
22.
Zurück zum Zitat Afzali, G.A., Mohammadi, S.: Privacy preserving big data mining: association rule hiding using fuzzy logic approach. IET Information Security (2016) Afzali, G.A., Mohammadi, S.: Privacy preserving big data mining: association rule hiding using fuzzy logic approach. IET Information Security (2016)
Metadaten
Titel
Privacy Preserving for Big Data Based on Fuzzy Set
verfasst von
Jun Wu
Chunzhi Wang
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_59