Survey on Data Security and Privacy Preserving in Big Data

  • Authors

    • A. A.Vineela
    • N. Kasiviswanath
    • L. Sudha Ran
    2018-12-13
    https://doi.org/10.14419/ijet.v7i4.39.26265
  • Big Data, Security, Privacy, Data encryption, Data mining.
  • With the rapid growth of IT industry, big data needs the improvement in storage, computation and network field. This enhancement also brings the new security and privacy issues to the big data. The researchers are attracted towards to solve the security and privacy issues. This paper made a survey on characteristics of big data along with security issues. The traditional security methods of cloud computing are not appropriate to the big data. Privacy preserving is also one major issue in big data. This survey also provides complete study on research issues and challenges of privacy preserving and the comparison is made to the privacy preserving techniques. Finally, this paper provides comprehensive overview of the methods to solve the big data security problem.

     

     

  • References

    1. [1] Kim, H. (2013). Privacy preserving security framework for cognitive radio networks. IETE Technical Review, 30(2), 142-148.

      [2] Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., & Byers, A. H. (2011). Big data: The next frontier for innovation, competition, and productivity.

      [3] J. Li, and X. Q. Cheng (2012), “Big data research: Major strategic field for future science and technology and the development of the economic society,†Bull. Chin. Acad. Sci.,27, (6), 647-57.

      [4] Feng, D., Zhang, M., & Li, H. (2014). Big data security and privacy protection. Chinese Journal of Computers, 37(1), 246-258.

      [5] Xiaofeng, M., & Xiang, C. (2013). Big data management: concepts, techniques and challenges [J]. Journal of computer research and development, 1(98), 146-169.

      [6] Kshetri, N. (2014). The emerging role of Big Data in key development issues: Opportunities, challenges, and concerns. Big Data & Society, 1(2), 2053951714564227.

      [7] Fang, W., Zheng, Y., & Xiu, J. (2014). Big data: Conceptions, key technologies and application. Nanjing Xinxi Gongcheng Daxue Xuebao, 6(5), 405.

      [8] Kim, G. H., Trimi, S., & Chung, J. H. (2014). Big-data applications in the government sector. Communications of the ACM, 57(3), 78-85.

      [9] Jagadish, H. V., Gehrke, J., Labrinidis, A., Papakonstantinou, Y., Patel, J. M., Ramakrishnan, R., & Shahabi, C. (2014). Big data and its technical challenges. Communications of the ACM, 57(7), 86-94.

      [10] Sweeney, L. (2002). k-anonymity: a model for protecting privacy'International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10, 5 (2002) 557-570.

      [11] Li, N., Li, T., & Venkatasubramanian, S. (2007, April). t-closeness: Privacy beyond k-anonymity and l-diversity. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on (pp. 106-115). IEEE.

      [12] Ying, X., & Wu, X. (2008, April). Randomizing social networks: a spectrum preserving approach. In proceedings of the 2008 SIAM International Conference on Data Mining (pp. 739-750). Society for Industrial and Applied Mathematics.

  • Downloads

  • How to Cite

    A.Vineela, A., Kasiviswanath, N., & Sudha Ran, L. (2018). Survey on Data Security and Privacy Preserving in Big Data. International Journal of Engineering & Technology, 7(4.39), 734-736. https://doi.org/10.14419/ijet.v7i4.39.26265