2016
DOI: 10.14257/ijseia.2016.10.2.22
|View full text |Cite
|
Sign up to set email alerts
|

Double Privacy Layer Architecture for Big Data Framework

Abstract: Big data is an emerging and very considerable technology for gathering and analyzing a huge volume of real-time produced data efficiently and effectively, but it has also a great volume of sensitive data arising invasion of privacy. Big data analyses can give us very customized and effective analysis results, but this technology can be abused for privacy invasion of personal users. This paper introduces sensitive information which can be collected and/or synthesized at the data collection stage, data analysis … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 0 publications
0
8
0
1
Order By: Relevance
“…The following are the most prominent extensions in this category, not to be discussed in depth here, and interested readers can refer to the literatures. These are k-anonymity [54], Tessellation [55], l-diversity [56], micro-aggregation [57], data aggregation [58], t-closeness [59], and historical k-anonymity [60].…”
Section: Anonymization-based Mechanismsmentioning
confidence: 99%
“…The following are the most prominent extensions in this category, not to be discussed in depth here, and interested readers can refer to the literatures. These are k-anonymity [54], Tessellation [55], l-diversity [56], micro-aggregation [57], data aggregation [58], t-closeness [59], and historical k-anonymity [60].…”
Section: Anonymization-based Mechanismsmentioning
confidence: 99%
“…The first-mentioned is in charge of searching for and eliminating sensitive personal information from the data gathered, which is done in order to make the information anonymous and thus make it more difficult to identify the person in particular. The second, postfiltering layer, disguises the summarized sensitive information following big data analysis [31]. define a series of steps in which the validity of the data stored is verified externally.…”
Section: Security Mechanisms Based Literature Reviewmentioning
confidence: 99%
“…By doing this we obtain a certain anonymity regarding the data, which is an important factor in the area of health [40]. As an alternative, the scheme by Cho et al (2016) can be used, which involves splitting the data into sensitive and nonsensitive but for the same purpose, that is, to make the information anonymous. The next step will be to use the proposal made by Jing (2014), which describes the use of double encryption in order to protect data [18].…”
Section: Proposed Security Solutionmentioning
confidence: 99%
See 2 more Smart Citations