2016
DOI: 10.1109/access.2016.2558446
|View full text |Cite
|
Sign up to set email alerts
|

Protection of Big Data Privacy

Abstract: In recent years, big data have become a hot research topic. The increasing amount of big data also increases the chance of breaching the privacy of individuals. Since big data require high computational power and large storage, distributed systems are used. As multiple parties are involved in these systems, the risk of privacy violation is increased. There have been a number of privacy-preserving mechanisms developed for privacy protection at different stages (e.g.,

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
100
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 207 publications
(113 citation statements)
references
References 66 publications
0
100
0
Order By: Relevance
“…In [1] Abid Mehmood and Iynkaran Natgunanathan 2016 explained a comprehensive overview of the privacy preservation mechanisms in big data and presented the challenges for existing mechanisms. It illustrated the infrastructure of big data and the statepreserving mechanisms in each stage of the big data life cycle.…”
Section: Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In [1] Abid Mehmood and Iynkaran Natgunanathan 2016 explained a comprehensive overview of the privacy preservation mechanisms in big data and presented the challenges for existing mechanisms. It illustrated the infrastructure of big data and the statepreserving mechanisms in each stage of the big data life cycle.…”
Section: Reviewmentioning
confidence: 99%
“…The authorized user can the uploaded encrypted files and read it on the system II. LITERATURE REVIEW In [1] Abid Mehmood and Iynkaran Natgunanathan 2016 explained a comprehensive overview of the privacy preservation mechanisms in big data and presented the challenges for existing m illustrated the infrastructure of big data and the state of-the-art privacy-preserving mechanisms in each stage of the big data life cycle. In [2] Ms. Chetana Girish Gorakh and Dr. Kishor M. Dhole 2016 presented an overview of big data concep characteristics and discussed introductory scenario about tools used in big data environment.…”
mentioning
confidence: 99%
“…Several survey papers that are focused on privacy-preserving techniques for different stages of distributed data reuse were identified [39][40][41][42][43][44][45][46]. The reference lists of the identified papers were searched to identify privacy-preserving techniques for reuse of data distributed across multiple data custodians.…”
Section: Methodsmentioning
confidence: 99%
“…European Union has enacted laws as Convention Automatic Processing Personal Data and European Union Data Protection Directive. Our country, China, had formulated regulations related to online privacy protection as follows [8] Legislation provides legal backing to privacy protection, but the hysteresis quality of law is not conductive to the further development of cyber economy. Compared with law, industry self-discipline norm has the flexibility of providing comfortable environment for the rapid development of the network economy and reducing administrative intervention, which is help to promote the fast development of the internet economy.…”
Section: Policies and Regulations Protection Technologymentioning
confidence: 99%