Nothing Special   »   [go: up one dir, main page]

Skip to main content

Privacy Preserving for Big Data Based on Fuzzy Set

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Included in the following conference series:

  • 2361 Accesses

Abstract

Today Big Data is one of the major technology usages for every research areas in competitive world. There are many important aspects with Big Data which would be volume, velocity, variety and veracity. Furthermore it is necessary to optimize existing methods to be executable for privacy preserving of Big Data. In this paper, firstly analysis about Big Data and its associated privacy Preserving, then makes an overview of privacy preservation especially for the Location Privacy Data. Furthermore it proposes model for privacy preserving, and then gives formulation about the algorithm of Privacy Preserving Based on Fuzzy Set (PPFS) which can help to achieve privacy preserving.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Baruh, L., Popescu, M.: Big data analytics and the limits of privacy self-management. New Media Soc. 1, 11–24 (2015)

    Google Scholar 

  2. Goroff, D., Polonetsky, J., Tene, O.: Privacy protective research: facilitating ethically responsible access to administrative data. Ann. Am. Acad. Polit. Soc. Sci. 675(1), 46–66 (2018)

    Article  Google Scholar 

  3. Madaan, N., Ahad, M.A., Sastry, S.M.: Data integration in IoT ecosystem: information linkage as a privacy threat. Comput. Law Secur. Rev. 34, 125–133 (2017)

    Article  Google Scholar 

  4. Weichert, T.: Health privacy in the age of digital networks. Bundesgesundheitsblatt - Gesundheitsforschung – Gesundheitsschutz, pp. 1–6 (2018)

    Google Scholar 

  5. Salah, K.P., Calyam, P., Boutaba, R.: Analytical model for elastic scaling of cloud-based firewalls. IEEE Trans. Netw. Serv. Manag. 14(1), 136–146 (2017)

    Article  Google Scholar 

  6. Wu, L., et al.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener. Comput. Syst. 73(C), 22–31 (2017)

    Article  Google Scholar 

  7. Mollah, M.B., Vasilakos, A., Vasilakos, A.: Security and Privacy Challenges in Mobile Cloud Computing. Academic Press Ltd., Cambridge (2017)

    Google Scholar 

  8. Yu, J., Wang, H.: Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 12(8), 1931–1940 (2017)

    Article  Google Scholar 

  9. Li, Y., et al.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387(C), 103–115 (2016)

    Google Scholar 

  10. Moor, D., et al.: Investigative response modeling and predictive data collection. eCrime Researchers Summit, pp. 1–6. IEEE (2013)

    Google Scholar 

  11. Wald, R., Khoshgoftaar, T., Sumner, C.: Machine prediction of personality from Facebook profiles. In: IEEE International Conference on Information Reuse and Integration, pp. 109–115 (2012)

    Google Scholar 

  12. Ayhan, S., et al.: Predictive analytics with aviation big data. 54(9), 1–13 (2013)

    Google Scholar 

  13. Bradford, R.B.: Use of latent semantic indexing to identify name variants in large data collections. In: IEEE International Conference on Intelligence and Security Informatics, pp. 27–32 (2013)

    Google Scholar 

  14. Bravo-Marquez, F., Mendoza, M., Poblete, B.: Meta-level sentiment models for big social data analysis. Knowl.-Based Syst. 69, 86–99 (2014)

    Article  Google Scholar 

  15. Zhang, Q., Yang, L.T., Chen, Z.: Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65(5), 1351–1362 (2016)

    Article  MathSciNet  Google Scholar 

  16. Sadhya, D., Singh, S.K., Chakraborty, B.: Review of key-binding-based biometric data preserving schemes. Iet. Biometrics 5(4), 263–275 (2016)

    Google Scholar 

  17. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)

    Article  Google Scholar 

  18. Baek, J., Vu, Q., Liu, K., Huang, X., Xiang, Y.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)

    Article  Google Scholar 

  19. Gai, K., Qiu, M., Zhao, H.: Security-aware efficient mass distributed storage approach for cloud systems in big data. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 140–145. IEEE, New York (2016)

    Google Scholar 

  20. Gai, K., Qiu, M., Zhao, H., Dai, W.: Anti-counterfeit schema using monte carlo simulation for e-commerce in cloud systems. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, pp. 74–79. IEEE, New York (2015)

    Google Scholar 

  21. Xing, K., et al.: Mutual privacy preserving k-means clustering in social participatory sensing. IEEE Trans. Indust. Informat. PP(99), 1 (2017)

    Google Scholar 

  22. Afzali, G.A., Mohammadi, S.: Privacy preserving big data mining: association rule hiding using fuzzy logic approach. IET Information Security (2016)

    Google Scholar 

Download references

Acknowledgements

The research is supported by the National Science Foundation (NSF) under Grants (No. 61602161), Hubei Natural Science Foundation under Grants (No. 2014CFB590), Natural Science Foundation of Hubei University of Technology under Grant (No. BSQD13039), Wuhan University of Technology Hubei Key Laboratory of Transportation Internet of Things Foundation under Grants (No. 2015III015-A03).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, J., Wang, C. (2018). Privacy Preserving for Big Data Based on Fuzzy Set. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_59

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics