2014 IEEE International Congress on Big Data 2014
DOI: 10.1109/bigdata.congress.2014.92
|View full text |Cite
|
Sign up to set email alerts
|

Making Big Data, Privacy, and Anonymization Work Together in the Enterprise: Experiences and Issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
117
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(118 citation statements)
references
References 9 publications
0
117
0
1
Order By: Relevance
“…It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous. The main difficulty with this technique involves combining anonymization, privacy protection, and big data techniques [56] to analyze usage data while protecting the identities. Intel Human Factors Engineering team needed to protect Intel employees' privacy using web page access logs and big data tools to enhance convenience of Intel's heavily used internal web portal.…”
Section: Identity Based Anonymizationmentioning
confidence: 99%
See 1 more Smart Citation
“…It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous. The main difficulty with this technique involves combining anonymization, privacy protection, and big data techniques [56] to analyze usage data while protecting the identities. Intel Human Factors Engineering team needed to protect Intel employees' privacy using web page access logs and big data tools to enhance convenience of Intel's heavily used internal web portal.…”
Section: Identity Based Anonymizationmentioning
confidence: 99%
“…To meet the significant benefits of Cloud storage [57], Intel created an open architecture for anonymization [56] that allowed a variety of tools to be utilized for both deidentifying and re-identifying web log records. In the implementing architecture process, enterprise data has properties different from the standard examples in anonymization literature [58].…”
Section: Identity Based Anonymizationmentioning
confidence: 99%
“…These techniques encountered issues when successfully combined anonymization, privacy protection, and big data techniques [41] to analyse usage data while protecting the identities of users. Intel Human Factors Engineering team wanted to use web page access logs and big data tools to enhance convenience of Intel's heavily used internal web portal.…”
Section: Identity Based Anonymizationmentioning
confidence: 99%
“…To meet these objectives, Intel created an open architecture for anonymization [41] that allowed a variety of tools to be utilized for both de-identifying and re-identifying web log records. In the process of implementing architecture, found that enterprise data has properties different from the standard examples in anonymization literature [43].…”
Section: Identity Based Anonymizationmentioning
confidence: 99%
“…But if the attacker can contain the user identifier data sets from other sources, and set up a user identifier and the data records of corresponding relations according to the standard identifier connected to multiple data sets, he can still be accurate to the individual information. In addition, the big data environment for information collection, storage and analysis provides a more powerful support, leading to the increase of the attacker's ability, thus anonymous protection becomes more difficult, therefore the researchers need to spend more efforts ensuring the safety of the big data environment anonymity [12,13].…”
Section: Big Data Privacy Protection Strategymentioning
confidence: 99%