Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Computationally Efficient Approaches for Privacy and Security of Big Data

View through CrossRef
Abstract Big data demands the cloud for storage, but organizations are not relying on the cloud, because of security and privacy reasons. When choosing the cloud for data storage, users worry about issues such as leakage of personal information, unauthorized user access and modification of data, and malicious behavior in cloud data access. Privacy leaks should be avoided during data analysis. Data integrity must be maintained to avoid data modification. Also need machine learning models to detect malicious activity patterns from users in the cloud to ensure data security. Therefore, big data requires technology that protects privacy and security with minimal investment of time and space. Hence approaches using anonymization, sanitization, integrity, and machine learning techniques are proposed. Anonymization can protect personal data from being disclosed upon receiving the data. The use of map-reduce along with anonymization reduces the computational overhead. Sanitization of type encryption/decryption with weighted fuzzy c-means clustering(WFCM) can protect privacy and security with less computation time. Elliptic curve with Diffie–Hellman (ECDH) algorithm is used to protect the integrity of the data with better accuracy than the other cryptosystem algorithms. To protect and safeguard the transactions in cloud applications, a novel solution using Machine Learning (ML) approach with Convolution Neural Networks and a support vector machine is employed. The efficiency of the classifier ability is measured using parameters such as precision, recall, and F-score. Therefore, all these techniques allow this research to protect the privacy and security of big data.
Research Square Platform LLC
Title: Computationally Efficient Approaches for Privacy and Security of Big Data
Description:
Abstract Big data demands the cloud for storage, but organizations are not relying on the cloud, because of security and privacy reasons.
When choosing the cloud for data storage, users worry about issues such as leakage of personal information, unauthorized user access and modification of data, and malicious behavior in cloud data access.
Privacy leaks should be avoided during data analysis.
Data integrity must be maintained to avoid data modification.
Also need machine learning models to detect malicious activity patterns from users in the cloud to ensure data security.
Therefore, big data requires technology that protects privacy and security with minimal investment of time and space.
Hence approaches using anonymization, sanitization, integrity, and machine learning techniques are proposed.
Anonymization can protect personal data from being disclosed upon receiving the data.
The use of map-reduce along with anonymization reduces the computational overhead.
Sanitization of type encryption/decryption with weighted fuzzy c-means clustering(WFCM) can protect privacy and security with less computation time.
Elliptic curve with Diffie–Hellman (ECDH) algorithm is used to protect the integrity of the data with better accuracy than the other cryptosystem algorithms.
To protect and safeguard the transactions in cloud applications, a novel solution using Machine Learning (ML) approach with Convolution Neural Networks and a support vector machine is employed.
The efficiency of the classifier ability is measured using parameters such as precision, recall, and F-score.
Therefore, all these techniques allow this research to protect the privacy and security of big data.

Related Results

THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
On Privacy and Security in Smart Connected Homes
On Privacy and Security in Smart Connected Homes
The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, t...
On Privacy and Security in Smart Connected Homes
On Privacy and Security in Smart Connected Homes
The growth and presence of heterogeneous sensor-equipped Internet-connected devices inside the home can increase efficiency and quality of life for the residents. Simultaneously, t...
Application Status and Prospect of Data Privacy Protection Technology
Application Status and Prospect of Data Privacy Protection Technology
This article aims to explore the current application status and future prospects of data privacy protection technology, analyze the challenges faced by current data privacy, explor...
Differential privacy learned index
Differential privacy learned index
Indexes are fundamental components of database management systems, traditionally implemented through structures like B-Tree, Hash, and BitMap indexes. These index structures map ke...

Back to Top