Academic Data Privacy-Preserving using Centralized and Distributed Systems: A Comparative Study

被引:0
|
作者
Lamaazi, Hanane [1 ]
Alneyadi, Aysha Saeed Mohammed [1 ]
Serhani, Mohamed Adel [2 ]
机构
[1] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
[2] Sharjah Univ, Coll Comp & Informat, Sharjah, U Arab Emirates
来源
2024 6TH INTERNATIONAL CONFERENCE ON BIG-DATA SERVICE AND INTELLIGENT COMPUTATION, BDSIC 2024 | 2024年
关键词
Additional Keywords and Phrases Education; data privacy; anonymity; distributed systems; centralized systems;
D O I
10.1145/3686540.3686542
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data privacy has become a critical concern in a set of domains, including healthcare, education, traffic monitoring, etc., due to technology's high deployment and massive data collection. In education, academic institutions have started taking several precautions to prevent data misuse, especially students' information, unauthorized access to the institution's databases, and any security breaches that can negatively affect the institutions' activities and objectives and students' lives. Protecting student information has become a priority, especially with the emergence of online learning, to create a safe environment, foster trust, and comply with relevant laws. Existing data privacy techniques are mostly deployed in centralized platforms, which can increase the data processing complexity and response time. However, the emergence of distributed systems helped to improve the infrastructure's security and users' privacy. Also, it reduced the processing and transmission time while providing high-quality services. This paper proposes a comparative study of deploying distributed and centralized platforms while preserving education data privacy. The distributed system is developed using k-means clustering, while data privacy is ensured by applying the k-anonymity technique using both generalization and suppression. As a result, the centralized system outperforms the distributed one in terms of beta-likeliness, t-closeness, and delta-disclosure, with less suppression. Also, centralized platforms require less execution time and higher memory allocation than distributed ones.
引用
收藏
页码:8 / 16
页数:9
相关论文
共 50 条
  • [21] A Privacy-Preserving Distributed Control of Optimal Power Flow
    Ryu, Minseok
    Kim, Kibaek
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2022, 37 (03) : 2042 - 2051
  • [22] Privacy-Preserving Distributed Learning for Renewable Energy Forecasting
    Goncalves, Carla
    Bessa, Ricardo J.
    Pinson, Pierre
    IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, 2021, 12 (03) : 1777 - 1787
  • [23] Data Protection: Privacy-Preserving Data Collection With Validation
    Hou, Jiahui
    Liu, Dongxiao
    Huang, Cheng
    Zhuang, Weihua
    Shen, Xuemin
    Sun, Rob
    Ying, Bidi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3422 - 3438
  • [24] Background knowledge attacks in privacy-preserving data publishing models
    Desai, Nidhi
    Das, Manik Lal
    Chaudhari, Payal
    Kumar, Naveen
    COMPUTERS & SECURITY, 2022, 122
  • [25] Privacy-preserving data splitting: a combinatorial approach
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    Ricci, Sara
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (07) : 1735 - 1756
  • [26] Privacy-preserving data publishing for cluster analysis
    Fung, Benjamin C. M.
    Wang, Ke
    Wang, Lingyu
    Hung, Patrick C. K.
    DATA & KNOWLEDGE ENGINEERING, 2009, 68 (06) : 552 - 575
  • [27] Privacy-preserving Naive Bayes classification in semi-fully distributed data model
    Duy-Hien Vu
    COMPUTERS & SECURITY, 2022, 115
  • [28] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    Journal of Computer Science & Technology, 2010, 25 (03) : 401 - 414
  • [29] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [30] Privacy-preserving data splitting: a combinatorial approach
    Oriol Farràs
    Jordi Ribes-González
    Sara Ricci
    Designs, Codes and Cryptography, 2021, 89 : 1735 - 1756