2018 IEEE 18th International Conference on Communication Technology (ICCT) 2018
DOI: 10.1109/icct.2018.8600051
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Big Data Security and Privacy Protection Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 54 publications
0
9
0
Order By: Relevance
“…In data storage phase, encryption is addressed in all studies excluding [80][81][82][83], and access control in storage phase is addressed in all studies excluding [79,80,84]. In addition, the studies addressed audit trail are [78,82,[85][86][87]. In the data analytics phase, technologies related to privacy-preserving data mining are investigated in all studies excluding [87,88], and the studies addressed access control is [78].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In data storage phase, encryption is addressed in all studies excluding [80][81][82][83], and access control in storage phase is addressed in all studies excluding [79,80,84]. In addition, the studies addressed audit trail are [78,82,[85][86][87]. In the data analytics phase, technologies related to privacy-preserving data mining are investigated in all studies excluding [87,88], and the studies addressed access control is [78].…”
Section: Discussionmentioning
confidence: 99%
“…In the data analytics phase, technologies related to privacy-preserving data mining are investigated in all studies excluding [87,88], and the studies addressed access control is [78]. The studies addressed the audit trail in the data utilization phase are [78,84], and the studies addressed privacy-preserving data publishing-related technologies are [80,81,84,86,87]. Techniques related to data destruction such as degaussing, and overwriting are not covered in all survey studies.…”
Section: Discussionmentioning
confidence: 99%
“…Generally, big data can be defined as the answer to the question as to how difficult it is to handle big datasets, with different forms, including structured, semi-structured, and unstructured, which are difficult to handle using traditional data analysis techniques [3], [16]. The other definition comes from ''what big data is,'' which focuses on a data processing technology architecture to capture and analyze valuable information from large and varied datasets [3]. These two definitions represent the five dimensions of big data (Volume, Variety, Velocity, Veracity, and Value) [17], [18], also referred to as the ''5Vs'', which are described as follows:…”
Section: Background a Big Data Technologymentioning
confidence: 99%
“…management will be more complicated. Accordingly, in big data schemes, it is hard to apply the traditional asymmetric, and symmetric encryption techniques directly [3]. In the case of cloud storage, due to large scale volume, significant increment, and rapid changes, encrypting big datasets directly will raise the risk of secret key management and require a considerable computation overhead [4].…”
Section: Introductionmentioning
confidence: 99%
“…Credibility, availability, data privacy, confidentiality, authentication and integrity are a few of the security and privacy issues associated with big data [3], [4], and [26]. For instance, the authors in [27] proposed a 3D security model for big data that is based on user roles, data processes as well as security requirements. According to the authors, these requirements define the security objectives and goals that should be achieved to preserve data security and privacy.…”
Section: Related Workmentioning
confidence: 99%