Skip to main content

2019 | OriginalPaper | Buchkapitel

Privacy of Big Data: A Review

verfasst von : S. Sangeetha, G. Sudha Sadasivam

Erschienen in: Handbook of Big Data and IoT Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Big data has become Buzzword in recent years. It is due to the fact that voluminous amount of structured, semi structured and unstructured data that is generated in the digital era. But, this huge data can be tracked and used for monetary benefits which thwart individual’s privacy. Hence numerous fruitful researches are made in privacy preservation. This book chapter lays emphases on the state-of-art privacy preserving data mining mechanisms and reviews the application of these mechanisms in big data environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bertino, Elisa and Lin, Dan and Jiang, Wei, 2008 A Survey of Quantification of Privacy Preserving Data Mining Algorithms, Privacy-Preserving Data Mining: Models and Algorithms, Springer US, 183—205. Bertino, Elisa and Lin, Dan and Jiang, Wei, 2008 A Survey of Quantification of Privacy Preserving Data Mining Algorithms, Privacy-Preserving Data Mining: Models and Algorithms, Springer US, 183—205.
3.
Zurück zum Zitat X. Zhang et al., Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud, in IEEE Transactions on Computers, vol. 64, no. 8, pp. 2293–2307, Aug. 1 2015. X. Zhang et al., Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud, in IEEE Transactions on Computers, vol. 64, no. 8, pp. 2293–2307, Aug. 1 2015.
4.
Zurück zum Zitat Jeffrey Dean and Sanjay Ghemawat. 2008. MapReduce: simplified data processing on large clusters. Commun. ACM 51, 1 (January 2008), 107–113. Jeffrey Dean and Sanjay Ghemawat. 2008. MapReduce: simplified data processing on large clusters. Commun. ACM 51, 1 (January 2008), 107–113.
5.
Zurück zum Zitat Hessam Zakerzadeh, Charu C. Aggarwal, and Ken Barker. 2015. Privacy-preserving big data publishing. In Proceedings of the 27th International Conference on Scientific and Statistical Database Management (SSDBM ′15), Amarnath Gupta and Susan Rathbun (Eds.). ACM, New York, NY, USA, Article 26, 11 pages. Hessam Zakerzadeh, Charu C. Aggarwal, and Ken Barker. 2015. Privacy-preserving big data publishing. In Proceedings of the 27th International Conference on Scientific and Statistical Database Management (SSDBM ′15), Amarnath Gupta and Susan Rathbun (Eds.). ACM, New York, NY, USA, Article 26, 11 pages.
6.
Zurück zum Zitat Kantarcioglu, Murat, 2008, A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data, Privacy-Preserving Data Mining: Models and Algorithms, Springer US, Pages: 313--335 Kantarcioglu, Murat, 2008, A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data, Privacy-Preserving Data Mining: Models and Algorithms, Springer US, Pages: 313--335
7.
Zurück zum Zitat Latanya Sweeney. 2002. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10, 5 (October 2002), 557–570. Latanya Sweeney. 2002. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10, 5 (October 2002), 557–570.
8.
Zurück zum Zitat Pierangela Samarati and Latanya Sweeney, Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression, 1998. Pierangela Samarati and Latanya Sweeney, Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression, 1998.
9.
Zurück zum Zitat K. LeFevre, D. J. DeWitt and R. Ramakrishnan, Mondrian Multidimensional K-Anonymity, 22nd International Conference on Data Engineering (ICDE′06), 2006, pp. 25–25. K. LeFevre, D. J. DeWitt and R. Ramakrishnan, Mondrian Multidimensional K-Anonymity, 22nd International Conference on Data Engineering (ICDE06), 2006, pp. 25–25.
10.
Zurück zum Zitat Hua, Ming and Pei, Jian, 2008, A Survey of Utility-based Privacy-Preserving Data Transformation Methods, Privacy-Preserving Data Mining: Models and Algorithms, Springer US, pages:207--237 Hua, Ming and Pei, Jian, 2008, A Survey of Utility-based Privacy-Preserving Data Transformation Methods, Privacy-Preserving Data Mining: Models and Algorithms, Springer US, pages:207--237
11.
Zurück zum Zitat A. Narayanan and V. Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), Oakland, CA, 2008, pp. 111–125. A. Narayanan and V. Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), Oakland, CA, 2008, pp. 111–125.
12.
Zurück zum Zitat T. M. Truta and B. Vinay, Privacy Protection: p-Sensitive k-Anonymity Property, 22nd International Conference on Data Engineering Workshops (ICDEW’06), Atlanta, GA, USA, 2006, pp. 94–94. T. M. Truta and B. Vinay, Privacy Protection: p-Sensitive k-Anonymity Property, 22nd International Conference on Data Engineering Workshops (ICDEW’06), Atlanta, GA, USA, 2006, pp. 94–94.
13.
Zurück zum Zitat Machanavajjhala, Ashwin & Gehrke, Johannes & Kifer, Daniel & Venkitasubramaniam, Muthuramakrishnan. (2006). l-Diversity: Privacy Beyond k-Anonymity. ACM Transactions on Knowledge Discovery From Data. Machanavajjhala, Ashwin & Gehrke, Johannes & Kifer, Daniel & Venkitasubramaniam, Muthuramakrishnan. (2006). l-Diversity: Privacy Beyond k-Anonymity. ACM Transactions on Knowledge Discovery From Data.
14.
Zurück zum Zitat NinghuiLi, Tiancheng Li, Suresh Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and ℓ -Diversity, 2007 IEEE 23rd International Conference on Data Engineering, 15–20 April 2007, Istanbul, Turkey. NinghuiLi, Tiancheng Li, Suresh Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and ℓ -Diversity, 2007 IEEE 23rd International Conference on Data Engineering, 15–20 April 2007, Istanbul, Turkey.
17.
Zurück zum Zitat Jun Wang, Shubo Liu, and Yongkai Li. 2016. A review of differential privacy in individual data release. Int. J. Distrib. Sen. Netw. 2015, Article 1 (January 2016), 1 pages. Jun Wang, Shubo Liu, and Yongkai Li. 2016. A review of differential privacy in individual data release. Int. J. Distrib. Sen. Netw. 2015, Article 1 (January 2016), 1 pages.
18.
Zurück zum Zitat Cynthia Dwork. 2006. Differential privacy. In Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II (ICALP′06), Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.), Vol. Part II. Springer-Verlag, Berlin, Heidelberg, 1–12. Cynthia Dwork. 2006. Differential privacy. In Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II (ICALP′06), Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.), Vol. Part II. Springer-Verlag, Berlin, Heidelberg, 1–12.
20.
Zurück zum Zitat V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin and E. Dasseni, 2004, Association rule hiding, in IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 4, pp. 434–447, April 2004. V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin and E. Dasseni, 2004, Association rule hiding, in IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 4, pp. 434–447, April 2004.
21.
Zurück zum Zitat Nabar, Shubha U and Kenthapadi, Krishnaram and Mishra, Nina and Motwani, Rajeev, 2008, A Survey of Query Auditing Techniques for Data Privacy, Privacy-Preserving Data, Springer US, pages: 415—431. Nabar, Shubha U and Kenthapadi, Krishnaram and Mishra, Nina and Motwani, Rajeev, 2008, A Survey of Query Auditing Techniques for Data Privacy, Privacy-Preserving Data, Springer US, pages: 415—431.
22.
Zurück zum Zitat Rakesh Agrawal and Ramakrishnan Srikant. 2000. Privacy-preserving data mining. In Proceedings of the 2000 ACM SIGMOD international conference on Management of data (SIGMOD ′00). ACM, New York, NY, USA, 439–450. Rakesh Agrawal and Ramakrishnan Srikant. 2000. Privacy-preserving data mining. In Proceedings of the 2000 ACM SIGMOD international conference on Management of data (SIGMOD ′00). ACM, New York, NY, USA, 439–450.
23.
Zurück zum Zitat Weiping Ge, Wei Wang, Xiaorong Li, and Baile Shi. 2005. A privacy-preserving classification mining algorithm. In Proceedings of the 9th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining (PAKDD′05), Tu Bao Ho, David Cheung, and Huan Liu (Eds.). Springer-Verlag, Berlin, Heidelberg, 256–261. Weiping Ge, Wei Wang, Xiaorong Li, and Baile Shi. 2005. A privacy-preserving classification mining algorithm. In Proceedings of the 9th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining (PAKDD′05), Tu Bao Ho, David Cheung, and Huan Liu (Eds.). Springer-Verlag, Berlin, Heidelberg, 256–261.
25.
Zurück zum Zitat Zhiqiang, Gao & Longjun, Zhang. (2018). Privacy Preserving Data Mining on Big Data Computing Platform: Trends and Future. 491–502. Zhiqiang, Gao & Longjun, Zhang. (2018). Privacy Preserving Data Mining on Big Data Computing Platform: Trends and Future. 491–502.
26.
Zurück zum Zitat Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel. 2010. Airavat: security and privacy for MapReduce. In Proceedings of the 7th USENIX conference on Networked systems design and implementation (NSDI′10). USENIX Association, Berkeley, CA, USA, 20–20. Indrajit Roy, Srinath T. V. Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel. 2010. Airavat: security and privacy for MapReduce. In Proceedings of the 7th USENIX conference on Networked systems design and implementation (NSDI′10). USENIX Association, Berkeley, CA, USA, 20–20.
27.
Zurück zum Zitat Blass, Erik-Oliver and Di Pietro, Roberto and Molva, Refik and Önen, Melek, 2012, PRISM – Privacy-Preserving Search in MapReduce, Privacy Enhancing Technologies, Springer Berlin Heidelberg, pages:180–200. Blass, Erik-Oliver and Di Pietro, Roberto and Molva, Refik and Önen, Melek, 2012, PRISM – Privacy-Preserving Search in MapReduce, Privacy Enhancing Technologies, Springer Berlin Heidelberg, pages:180–200.
28.
Zurück zum Zitat M. E. Gursoy, A. Inan, M. E. Nergiz and Y. Saygin, Privacy-Preserving Learning Analytics: Challenges and Techniques, in IEEE Transactions on Learning Technologies, vol. 10, no. 1, pp. 68–81, Jan.-March 1 2017. M. E. Gursoy, A. Inan, M. E. Nergiz and Y. Saygin, Privacy-Preserving Learning Analytics: Challenges and Techniques, in IEEE Transactions on Learning Technologies, vol. 10, no. 1, pp. 68–81, Jan.-March 1 2017.
29.
Zurück zum Zitat Kangsoo Jung, Sehwa Park, and Seog Park. 2014. Hiding a Needle in a Haystack: Privacy Preserving Apriori algorithm in MapReduce Framework. In Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (PSBD ′14). ACM, New York, NY, USA, 11–17. Kangsoo Jung, Sehwa Park, and Seog Park. 2014. Hiding a Needle in a Haystack: Privacy Preserving Apriori algorithm in MapReduce Framework. In Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (PSBD ′14). ACM, New York, NY, USA, 11–17.
30.
Zurück zum Zitat Chi Lin, Zihao Song, Houbing Song, Yanhong Zhou, Yi Wang, and Guowei Wu. 2016. Differential Privacy Preserving in Big Data Analytics for Connected Health. J. Med. Syst. 40, 4 (April 2016), 1–9. Chi Lin, Zihao Song, Houbing Song, Yanhong Zhou, Yi Wang, and Guowei Wu. 2016. Differential Privacy Preserving in Big Data Analytics for Connected Health. J. Med. Syst. 40, 4 (April 2016), 1–9.
31.
Zurück zum Zitat Abouelmehdi, Karim and Beni-Hessane, Abderrahim and Khaloufi, Hayat, 2018, Big healthcare data: preserving security and privacy, Journal of Big Data, volume 5,number 1, pages 1, 09-Jan 2018. Abouelmehdi, Karim and Beni-Hessane, Abderrahim and Khaloufi, Hayat, 2018, Big healthcare data: preserving security and privacy, Journal of Big Data, volume 5,number 1, pages 1, 09-Jan 2018.
32.
Zurück zum Zitat Hill K. How target figured out a teen girl was pregnant before her father did. Forbes, Inc. 2012. Hill K. How target figured out a teen girl was pregnant before her father did. Forbes, Inc. 2012.
33.
Zurück zum Zitat Jain, Priyank and Gyanchandani, Manasi and Khare, Nilay, 2016, Big data privacy: a technological perspective and review, Journal of Big Data, volume 3, number 1, 26-Nov-2016, pages 25. Jain, Priyank and Gyanchandani, Manasi and Khare, Nilay, 2016, Big data privacy: a technological perspective and review, Journal of Big Data, volume 3, number 1, 26-Nov-2016, pages 25.
34.
Zurück zum Zitat Omar Hasan, Benjamin Habegger, Lionel Brunie, Nadia Bennani, and Ernesto Damiani. 2013. A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case. In Proceedings of the 2013 IEEE International Congress on Big Data (BIGDATACONGRESS ′13). IEEE Computer Society, Washington, DC, USA, 25–30. Omar Hasan, Benjamin Habegger, Lionel Brunie, Nadia Bennani, and Ernesto Damiani. 2013. A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case. In Proceedings of the 2013 IEEE International Congress on Big Data (BIGDATACONGRESS ′13). IEEE Computer Society, Washington, DC, USA, 25–30.
35.
Zurück zum Zitat J. Sedayao, R. Bhardwaj and N. Gorade, Making Big Data, Privacy, and Anonymization Work Together in the Enterprise: Experiences and Issues, 2014 IEEE International Congress on Big Data, Anchorage, AK, 2014, pp. 601–607. J. Sedayao, R. Bhardwaj and N. Gorade, Making Big Data, Privacy, and Anonymization Work Together in the Enterprise: Experiences and Issues, 2014 IEEE International Congress on Big Data, Anchorage, AK, 2014, pp. 601–607.
36.
Zurück zum Zitat Xuyun Zhang, Chi Yang, Surya Nepal, Chang Liu, Wanchun Dou, and Jinjun Chen. 2013. A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud. In Proceedings of the 2013 International Conference on Cloud and Green Computing (CGC ′13). IEEE Computer Society, Washington, DC, USA, 105–112. Xuyun Zhang, Chi Yang, Surya Nepal, Chang Liu, Wanchun Dou, and Jinjun Chen. 2013. A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud. In Proceedings of the 2013 International Conference on Cloud and Green Computing (CGC ′13). IEEE Computer Society, Washington, DC, USA, 105–112.
37.
Zurück zum Zitat Jain, Priyank and Gyanchandani, Manasi and Khare, Nilay, 2018, Differential privacy: its technological prescriptive using big data, Journal of Big Data, volume 5, number 1, 13 Apr 2018, pages 15. Jain, Priyank and Gyanchandani, Manasi and Khare, Nilay, 2018, Differential privacy: its technological prescriptive using big data, Journal of Big Data, volume 5, number 1, 13 Apr 2018, pages 15.
38.
Zurück zum Zitat S. Wang et al., Big Data Privacy in Biomedical Research, in IEEE Transactions on Big Data. S. Wang et al., Big Data Privacy in Biomedical Research, in IEEE Transactions on Big Data.
39.
Zurück zum Zitat A. Mehmood, I. Natgunanathan, Y. Xiang, G. Hua and S. Guo, Protection of Big Data Privacy, in IEEE Access, vol. 4, pp. 1821–1834, 2016. A. Mehmood, I. Natgunanathan, Y. Xiang, G. Hua and S. Guo, Protection of Big Data Privacy, in IEEE Access, vol. 4, pp. 1821–1834, 2016.
40.
Zurück zum Zitat Matturdi, Bardi & Zhou, Xianwei & Li, Shuai & Lin, Fuhong. (2014). Big Data security and privacy: A review. China Communications. January 2014, 11(14), pages: 135–145. Matturdi, Bardi & Zhou, Xianwei & Li, Shuai & Lin, Fuhong. (2014). Big Data security and privacy: A review. China Communications. January 2014, 11(14), pages: 135–145.
41.
Zurück zum Zitat C. Perera, R. Ranjan, L. Wang, S. U. Khan and A. Y. Zomaya, Big Data Privacy in the Internet of Things Era, in IT Professional, vol. 17, no. 3, pp. 32–39, May–June 2015. C. Perera, R. Ranjan, L. Wang, S. U. Khan and A. Y. Zomaya, Big Data Privacy in the Internet of Things Era, in IT Professional, vol. 17, no. 3, pp. 32–39, May–June 2015.
Metadaten
Titel
Privacy of Big Data: A Review
verfasst von
S. Sangeetha
G. Sudha Sadasivam
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-10543-3_2