2021
DOI: 10.4018/ijoris.20211001.oa3
|View full text |Cite
|
Sign up to set email alerts
|

A Technique for Securing Big Data Using K-Anonymization With a Hybrid Optimization Algorithm

Abstract: The recent techniques built on cloud computing for data processing is scalable and secure, which increasingly attracts the infrastructure to support big data applications. This paper proposes an effective anonymization based privacy preservation model using k-anonymization criteria and Grey wolf-Cat Swarm Optimization (GWCSO) for attaining privacy preservation in big data. The anonymization technique is processed by adapting k- anonymization criteria for duplicating k records from the original database. The pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 33 publications
0
6
0
Order By: Relevance
“…Big data privacy has been successfully preserved using an algorithm known as Grey Wolf Optimizer-Cat Swarm Optimization (GWO-CSO). The generated model, which is used to create the k-anonymization database in which k numbers of duplicate records are created within the real database [17], is obtained by changing the update rules of GWO in the presence of the CSO algorithm. In order to provide safe data transmission over to end users, the newly created technique is used in the k-anonymized database to conceal the sensitive information relating to the data owners.…”
Section: Schemes Concerning Intelligent Techniquesmentioning
confidence: 99%
See 4 more Smart Citations
“…Big data privacy has been successfully preserved using an algorithm known as Grey Wolf Optimizer-Cat Swarm Optimization (GWO-CSO). The generated model, which is used to create the k-anonymization database in which k numbers of duplicate records are created within the real database [17], is obtained by changing the update rules of GWO in the presence of the CSO algorithm. In order to provide safe data transmission over to end users, the newly created technique is used in the k-anonymized database to conceal the sensitive information relating to the data owners.…”
Section: Schemes Concerning Intelligent Techniquesmentioning
confidence: 99%
“…In order to provide safe data transmission over to end users, the newly created technique is used in the k-anonymized database to conceal the sensitive information relating to the data owners. The created technique ensures the k-anonymization phenomena by producing the parameters required to build the k-anonymized database ideally [17]. The privacy and utility metrics consider evaluating the fitness of the solutions obtained using the developed algorithm [17].…”
Section: Schemes Concerning Intelligent Techniquesmentioning
confidence: 99%
See 3 more Smart Citations