Academic Data Privacy-Preserving using Centralized and Distributed Systems: A Comparative Study

被引:0
|
作者
Lamaazi, Hanane [1 ]
Alneyadi, Aysha Saeed Mohammed [1 ]
Serhani, Mohamed Adel [2 ]
机构
[1] United Arab Emirates Univ, Coll Informat Technol, Al Ain, U Arab Emirates
[2] Sharjah Univ, Coll Comp & Informat, Sharjah, U Arab Emirates
来源
2024 6TH INTERNATIONAL CONFERENCE ON BIG-DATA SERVICE AND INTELLIGENT COMPUTATION, BDSIC 2024 | 2024年
关键词
Additional Keywords and Phrases Education; data privacy; anonymity; distributed systems; centralized systems;
D O I
10.1145/3686540.3686542
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data privacy has become a critical concern in a set of domains, including healthcare, education, traffic monitoring, etc., due to technology's high deployment and massive data collection. In education, academic institutions have started taking several precautions to prevent data misuse, especially students' information, unauthorized access to the institution's databases, and any security breaches that can negatively affect the institutions' activities and objectives and students' lives. Protecting student information has become a priority, especially with the emergence of online learning, to create a safe environment, foster trust, and comply with relevant laws. Existing data privacy techniques are mostly deployed in centralized platforms, which can increase the data processing complexity and response time. However, the emergence of distributed systems helped to improve the infrastructure's security and users' privacy. Also, it reduced the processing and transmission time while providing high-quality services. This paper proposes a comparative study of deploying distributed and centralized platforms while preserving education data privacy. The distributed system is developed using k-means clustering, while data privacy is ensured by applying the k-anonymity technique using both generalization and suppression. As a result, the centralized system outperforms the distributed one in terms of beta-likeliness, t-closeness, and delta-disclosure, with less suppression. Also, centralized platforms require less execution time and higher memory allocation than distributed ones.
引用
收藏
页码:8 / 16
页数:9
相关论文
共 50 条
  • [41] OPERA: Optional Dimensional Privacy-Preserving Data Aggregation for Smart Healthcare Systems
    Liu, Huadong
    Gu, Tianlong
    Shojafar, Mohammad
    Alazab, Mamoun
    Liu, Yining
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 857 - 866
  • [42] Towards efficient cryptography for privacy preserving data mining in distributed systems
    Magkos, Emmanouil
    Chrissikopoulos, Vassilis
    WEBIST 2008: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2008, : 301 - 304
  • [43] Privacy-preserving distributed optimization for economic dispatch in smart grids
    An, Wenjing
    Ding, Derui
    Wang, Zidong
    Liu, Qinyuan
    Dong, Hongli
    AUTOMATICA, 2025, 177
  • [44] Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis
    Zaman, Zakia
    Xue, Wanli
    Gauravaram, Praveen
    Hu, Wen
    Jiang, Jiaojiao
    Jha, Sanjay K.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9173 - 9187
  • [45] Rings for Privacy: An Architecture for Large Scale Privacy-Preserving Data Mining
    Merani, Maria Luisa
    Croce, Daniele
    Tinnirello, Ilenia
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (06) : 1340 - 1352
  • [46] Privacy, space, and time: a survey on privacy-preserving continuous data publishing
    Katsomallos, Manos
    Tzompanaki, Katerina
    Kotzinos, Dimitris
    JOURNAL OF SPATIAL INFORMATION SCIENCE, 2019, (19): : 57 - 103
  • [47] Privacy Passport: Privacy-Preserving Cross-Domain Data Sharing
    Chen, Xue
    Wang, Cheng
    Yang, Qing
    Teng, Hu
    Jiang, Changjun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 636 - 650
  • [48] Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation
    Jiang, Bo
    Li, Ming
    Tandon, Ravi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1918 - 1935
  • [49] Privacy-Preserving Rule Induction Using CKKS
    Choi, Jihyeon
    Choi, Jina
    Lee, Younho
    Hong, Jung-Sik
    IEEE ACCESS, 2024, 12 : 171540 - 171558
  • [50] PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data
    Kotal, Anantaa
    Piplai, Aritran
    Chukkapalli, Sai Sree Laya
    Joshi, Anupam
    PROCEEDINGS OF THE 2022 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA '22), 2022, : 35 - 45