2016 Seventh Latin-American Symposium on Dependable Computing (LADC) 2016
DOI: 10.1109/ladc.2016.34
|View full text |Cite
|
Sign up to set email alerts
|

Challenges on Anonymity, Privacy, and Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 34 publications
0
16
0
Order By: Relevance
“…However, such approaches are prone to human mistakes and privacy attacks, which can reveal private user information through background knowledge engineering and intersection attacks. For example, the exposure of Netflix users' data through linkage with other websites (Basso et al., 2016), and the infamous failure of InBloom of which the major issue was sharing of sensitive students' data with third parties (Gursoy et al., 2016).…”
Section: Privacy Enhancing Technologiesmentioning
confidence: 99%
“…However, such approaches are prone to human mistakes and privacy attacks, which can reveal private user information through background knowledge engineering and intersection attacks. For example, the exposure of Netflix users' data through linkage with other websites (Basso et al., 2016), and the infamous failure of InBloom of which the major issue was sharing of sensitive students' data with third parties (Gursoy et al., 2016).…”
Section: Privacy Enhancing Technologiesmentioning
confidence: 99%
“…(6) Allowing the analytics to produce useful insight while preserving anonymity and individual privacy is highly challenging and constitutes one of the mounting concerns in Big Data (Basso et al 2016;Gahi et al 2016;Jensen 2013). Individuals can become widely vulnerable to security and privacy violations given that huge amounts of their behavioural data are being collected from online footprints, sensors, and sensory systems, notably without a pre-established goal (van der Sloot 2015), and are stored in dispersed databases thereby presenting an attractive target for attackers.…”
Section: Mrq6: Can We Identify Any Topics Within These Areas That Could Be Subjects For Further Research?mentioning
confidence: 99%
“…that is processed by data analytics algorithms. PRIVAaaS is based on anonymization techniques (e.g., generalization, suppression, encryption, masking [25]) and anonymization policies [26]. It is a free and open source tool, developed in Java language and suitable for big data and cloud computing contexts.…”
Section: Data Privacymentioning
confidence: 99%