2022
DOI: 10.17762/ijcnis.v12i1.4401
|View full text |Cite
|
Sign up to set email alerts
|

A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data

Abstract: Recently, Big Data processing becomes crucial to most enterprise and government applications due to the fast growth of the collected data. However, this data often includes private personal information that arise new security and privacy concerns. Moreover, it is widely agreed that the sheer scale of big data makes many privacy preserving techniques unavailing. Therefore, in order to ensure privacy in big data, anonymization is suggested as one of the most efficient approaches. In this paper, we will provide a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 36 publications
0
1
0
Order By: Relevance
“…A secure smart healthcare system defined by Zhang et al offers user privacy protection by providing fine-grained access control to smart healthcare cloud data. Cipher text-policy attribute-based encryption is a promising cryptographic primitive [11].…”
Section: Systematic Literature Review (Slr)mentioning
confidence: 99%
“…A secure smart healthcare system defined by Zhang et al offers user privacy protection by providing fine-grained access control to smart healthcare cloud data. Cipher text-policy attribute-based encryption is a promising cryptographic primitive [11].…”
Section: Systematic Literature Review (Slr)mentioning
confidence: 99%
“…Tokenization is another pseudonymization scheme that can be considered within the vehicular environment. It is the process of replacing sensitive characters by other random non-sensitive values that cannot be mathematically computed from the data source length [49]. Although, when applied to location data, even if the identities are replaced by pseudonyms, individuals can still be singled out and tracked, as demonstrated by De Montjoye et al [50].…”
Section: Pseudonymizationmentioning
confidence: 99%
“…There is a wide spectrum of anonymization techniques that can be applied to protect vehicular data, but their definitions are noticeably overlapping and commonly mistaken [49]. Data randomization (also called noising) and data generalization are the core anonymization families according to opinion 05/2014 of the WP29 [35].…”
Section: Anonymizationmentioning
confidence: 99%
See 2 more Smart Citations