Privacy Protection in Mobile Big Data: Challenges and Solutions

被引:0
作者
Su, Peihua [1 ]
机构
[1] Institute of Technology, Xi’an International University, Xi’an
关键词
hypergraph clustering; location information; mobile big data; privacy protection; semantic information; uncertain graph model;
D O I
10.3991/ijim.v18i18.51495
中图分类号
学科分类号
摘要
The pervasive use of mobile big data has profoundly altered daily life, providing unprecedented convenience and efficiency. However, with the proliferation of mobile devices and the explosive growth of data volume, the issue of user privacy protection has become increasingly severe. Location information and semantic information, as the two core components of mobile big data, can directly reflect users’ behavioral trajectories and thought dynamics, underscoring the importance of privacy protection. Although existing technologies can protect user data to a certain extent, traditional methods struggle to address increasingly sophisticated attack techniques in the face of evolving privacy threats. A comprehensive privacy protection scheme for mobile big data was proposed in this study, with a focus on two main areas: the privacy protection of location-based and semantic-based mobile big data. For location information protection, an uncertain graph model was employed to effectively resist combined attacks by jointly protecting the user layer and the location layer. For semantic information protection, a hypergraph clustering method was used to structurally protect the user layer and the semantic layer, enhancing the privacy security of semantic information. This study not only addresses existing gaps but also provides new solutions for mobile big data privacy protection, offering significant theoretical and practical value. © 2024 by the authors of this article.
引用
收藏
页码:49 / 61
页数:12
相关论文
共 20 条
[1]  
Anawar S., Othman N. F., Selamat S. R., Ayop Z., Harum N., Abdul Rahim F., Security and privacy challenges of big data adoption: A qualitative study in telecommunication industry, International Journal of Interactive Mobile Technologies (iJIM), 16, 19, pp. 81-97, (2022)
[2]  
Chennamaneni A., Gupta B., The privacy protection behaviours of the mobile app users: Exploring the role of neuroticism and protection motivation theory, Behaviour & Information Technology, 42, 12, pp. 2011-2029, (2023)
[3]  
Almogbel R. S., Alkhalifah A. A., User behavior in social networks toward privacy and trust: Literature review, International Journal of Interactive Mobile Technologies (iJIM), 16, 1, pp. 38-51, (2022)
[4]  
Bikku T., Biyyapu N. S., Sekhar J. C., Kumar M. K., Nokerov S. M., Pratap V. K., The social network dilemma: Safeguarding privacy and security in an online community, International Journal of Safety and Security Engineering, 14, 1, pp. 125-133, (2024)
[5]  
Mueller R., Big data, big gap: Working towards a HIPAA framework that covers big data, Indiana Law Journal, 97, 4, (2022)
[6]  
Senturk O., Baghirov A., Enhancing sustainable development through blockchain: A study on risk management and data integrity, Journal of Organizations, Technology and Entrepreneurship, 1, 2, pp. 110-126, (2023)
[7]  
Wiedemann N., Janowicz K., Raubal M., Kounadi O., Where you go is who you are: A study on machine learning based semantic privacy attacks, Journal of Big Data, 11, 1, (2024)
[8]  
Carmi L., Zohar M., Riva G. M., The European general data protection regulation (GDPR) in mHealth: Theoretical and practical aspects for practitioners’ use, Medicine, Science and the Law, 63, 1, pp. 61-68, (2023)
[9]  
Sajid M. D., Kavitha S., Privacy-preserving photo sharing on online social networks: A review, International Journal of Safety and Security Engineering, 14, 1, pp. 297-308, (2024)
[10]  
Ribeiro-Navarrete S., Saura J. R., Palacios-Marques D., Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy, Technological Forecasting and Social Change, 167, (2021)