Javascript must be enabled to continue!
Aggregate Query Frameworks for Preserving Privacy Data in Big Data Analytics
View through CrossRef
Abstract
Data utility and data privacy are both serious issues that must be considered when datasets are released to use in big data analytics because they are traded-off issues. That is, high-utility datasets are generally high risks in terms of privacy violation issues. Likewise, datasets are formed to be high security in terms of privacy preservation, they often lead to data utility issues. To address these issues in datasets, several privacy preservation models have been proposed such as k-Anonymity, l-Diversity, t-Closeness, Anatomy, k-Likeness, and (lp1, . . . , lpn)-Privacy, i.e., all users’ explicit identifier values and all unique quasi-identifier values in datasets are removed and distorted respectively. Unfortunately, these privacy preservation models are static data models and still have data utility issues that must be addressed. Thus, they could be insufficient to address privacy violation issues in big data analytics. For this reason, a new efficient and effective privacy preservation model is proposed in this work such that it is based on aggregate query answers that can guarantee the confidence of the range and the minimized number of values that can be re-identified. The aims of the proposed privacy preservation model are that aside from privacy preservation constraints, the complexity and data utility are also maintained as much as possible. Furthermore, we show that the proposed model is a privacy preservation model that is efficient and effective by using extensive experiments.
Title: Aggregate Query Frameworks for Preserving Privacy Data in Big Data Analytics
Description:
Abstract
Data utility and data privacy are both serious issues that must be considered when datasets are released to use in big data analytics because they are traded-off issues.
That is, high-utility datasets are generally high risks in terms of privacy violation issues.
Likewise, datasets are formed to be high security in terms of privacy preservation, they often lead to data utility issues.
To address these issues in datasets, several privacy preservation models have been proposed such as k-Anonymity, l-Diversity, t-Closeness, Anatomy, k-Likeness, and (lp1, .
.
.
, lpn)-Privacy, i.
e.
, all users’ explicit identifier values and all unique quasi-identifier values in datasets are removed and distorted respectively.
Unfortunately, these privacy preservation models are static data models and still have data utility issues that must be addressed.
Thus, they could be insufficient to address privacy violation issues in big data analytics.
For this reason, a new efficient and effective privacy preservation model is proposed in this work such that it is based on aggregate query answers that can guarantee the confidence of the range and the minimized number of values that can be re-identified.
The aims of the proposed privacy preservation model are that aside from privacy preservation constraints, the complexity and data utility are also maintained as much as possible.
Furthermore, we show that the proposed model is a privacy preservation model that is efficient and effective by using extensive experiments.
Related Results
ecision Farming and Predictive Analytics in Precision Farming and Predictive Analytics in Precision Farming and Predictive Analytics in Precision Farming and Predictive Analytics in Precision Farming and Predictive Analytics in Precision Farming and Predi
ecision Farming and Predictive Analytics in Precision Farming and Predictive Analytics in Precision Farming and Predictive Analytics in Precision Farming and Predictive Analytics in Precision Farming and Predictive Analytics in Precision Farming and Predi
The scope of sensor networks and the Internet of Things spanning rapidly to diversified domains but not limited to sports, health, and business trading. In recent past, the sensors...
Query expansion by relying on the structure of knowledge bases
Query expansion by relying on the structure of knowledge bases
Query expansion techniques aim at improving the results achieved by a user's query by means of introducing new expansion terms, called expansion features. Expansion features introd...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract
Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Electronic Health (e-Health), such as mobile health (mHealth) and Health Information Systems (HIS), benefits healthcare consumers and professionals. However, it also poses potentia...
BIG DATA ANALYTICS: A REVIEW OF ITS TRANSFORMATIVE ROLE IN MODERN BUSINESS INTELLIGENCE
BIG DATA ANALYTICS: A REVIEW OF ITS TRANSFORMATIVE ROLE IN MODERN BUSINESS INTELLIGENCE
In the dynamic landscape of modern business intelligence, Big Data Analytics has emerged as a transformative force, reshaping the way organizations derive insights from vast and di...
Impacts of big data on accounting
Impacts of big data on accounting
Big data and data analytics are currently the buzzwords in both academia and industry to become data driven. Big data has been the trending topic in the accounting industry also. B...
A Privacy Protection Method for Power User Profiles That Integrates Improved Differential Privacy and Secret Sharing
A Privacy Protection Method for Power User Profiles That Integrates Improved Differential Privacy and Secret Sharing
ABSTRACT
In response to the privacy leakage risks inherent in the big data processing of power user personas, propose a collaborative optimiz...
A Survey of Query Auto Completion in Information Retrieval
A Survey of Query Auto Completion in Information Retrieval
In information retrieval, query auto completion (QAC), also known as type-ahead [Xiao et al., 2013, Cai et al., 2014b] and auto-complete suggestion [Jain and Mishne, 2010], refers ...

