Abstract
Today Big Data is one of the major technology usages for every research areas in competitive world. There are many important aspects with Big Data which would be volume, velocity, variety and veracity. Furthermore it is necessary to optimize existing methods to be executable for privacy preserving of Big Data. In this paper, firstly analysis about Big Data and its associated privacy Preserving, then makes an overview of privacy preservation especially for the Location Privacy Data. Furthermore it proposes model for privacy preserving, and then gives formulation about the algorithm of Privacy Preserving Based on Fuzzy Set (PPFS) which can help to achieve privacy preserving.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Baruh, L., Popescu, M.: Big data analytics and the limits of privacy self-management. New Media Soc. 1, 11–24 (2015)
Goroff, D., Polonetsky, J., Tene, O.: Privacy protective research: facilitating ethically responsible access to administrative data. Ann. Am. Acad. Polit. Soc. Sci. 675(1), 46–66 (2018)
Madaan, N., Ahad, M.A., Sastry, S.M.: Data integration in IoT ecosystem: information linkage as a privacy threat. Comput. Law Secur. Rev. 34, 125–133 (2017)
Weichert, T.: Health privacy in the age of digital networks. Bundesgesundheitsblatt - Gesundheitsforschung – Gesundheitsschutz, pp. 1–6 (2018)
Salah, K.P., Calyam, P., Boutaba, R.: Analytical model for elastic scaling of cloud-based firewalls. IEEE Trans. Netw. Serv. Manag. 14(1), 136–146 (2017)
Wu, L., et al.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener. Comput. Syst. 73(C), 22–31 (2017)
Mollah, M.B., Vasilakos, A., Vasilakos, A.: Security and Privacy Challenges in Mobile Cloud Computing. Academic Press Ltd., Cambridge (2017)
Yu, J., Wang, H.: Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 12(8), 1931–1940 (2017)
Li, Y., et al.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387(C), 103–115 (2016)
Moor, D., et al.: Investigative response modeling and predictive data collection. eCrime Researchers Summit, pp. 1–6. IEEE (2013)
Wald, R., Khoshgoftaar, T., Sumner, C.: Machine prediction of personality from Facebook profiles. In: IEEE International Conference on Information Reuse and Integration, pp. 109–115 (2012)
Ayhan, S., et al.: Predictive analytics with aviation big data. 54(9), 1–13 (2013)
Bradford, R.B.: Use of latent semantic indexing to identify name variants in large data collections. In: IEEE International Conference on Intelligence and Security Informatics, pp. 27–32 (2013)
Bravo-Marquez, F., Mendoza, M., Poblete, B.: Meta-level sentiment models for big social data analysis. Knowl.-Based Syst. 69, 86–99 (2014)
Zhang, Q., Yang, L.T., Chen, Z.: Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65(5), 1351–1362 (2016)
Sadhya, D., Singh, S.K., Chakraborty, B.: Review of key-binding-based biometric data preserving schemes. Iet. Biometrics 5(4), 263–275 (2016)
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
Baek, J., Vu, Q., Liu, K., Huang, X., Xiang, Y.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233–244 (2015)
Gai, K., Qiu, M., Zhao, H.: Security-aware efficient mass distributed storage approach for cloud systems in big data. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 140–145. IEEE, New York (2016)
Gai, K., Qiu, M., Zhao, H., Dai, W.: Anti-counterfeit schema using monte carlo simulation for e-commerce in cloud systems. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, pp. 74–79. IEEE, New York (2015)
Xing, K., et al.: Mutual privacy preserving k-means clustering in social participatory sensing. IEEE Trans. Indust. Informat. PP(99), 1 (2017)
Afzali, G.A., Mohammadi, S.: Privacy preserving big data mining: association rule hiding using fuzzy logic approach. IET Information Security (2016)
Acknowledgements
The research is supported by the National Science Foundation (NSF) under Grants (No. 61602161), Hubei Natural Science Foundation under Grants (No. 2014CFB590), Natural Science Foundation of Hubei University of Technology under Grant (No. BSQD13039), Wuhan University of Technology Hubei Key Laboratory of Transportation Internet of Things Foundation under Grants (No. 2015III015-A03).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Wu, J., Wang, C. (2018). Privacy Preserving for Big Data Based on Fuzzy Set. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_59
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_59
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)