A Scalable (α, k)-Anonymization Approach using MapReduce for Privacy Preserving Big Data Publishing

被引:0
作者
Mehta, Brijesh B. [1 ]
Gupta, Ruchika [2 ]
Rao, Udai Pratap [3 ]
Muthiyan, Mukesh [4 ]
机构
[1] Coll Technol & Engn, Dept Comp Sci & Engn, Udaipur, Rajasthan, India
[2] Chandigarh Univ, Comp Sci & Engn Dept, Mohali, India
[3] Sardar Vallabhbhai Natl Inst Technol, Dept Comp Engn, Surat, India
[4] Automaton Infosyst Pvt Ltd, Pune, Maharashtra, India
来源
2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT) | 2019年
关键词
Big data privacy; Scalable k-Anonymization (SKA); k; -anonymity; MapReduce based Anonymization (MRA); Velocity of data; ANONYMIZATION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Different tools and sources are used to collect big data, which may create privacy issues. k -anonymity, /-diversity, t -closeness etc. privacy preserving data publishing approaches are used data de-identification, but as multiple sources is used to collect the data, chance of re-identification is very high. Anonymization large data is not a trivial task, hence, privacy preserving approaches scalability has become a challenging research area. Researchers explore it by proposing algorithms for scalable anonymization. We further found that in some scenarios efficient anonymization is not enough, timely anonymization is also required. Hence, to incorporate the velocity of data with Scalable k-Anonymization (SKA) approach, we propose a novel approach, Scalable (cr, k)-Anonymization (SAKA). Our proposed approach outperforms in terms of information loss and running time as compared to existing approaches. With best of our knowledge, this is the first proposed scalable anonymization approach for the velocity of data.
引用
收藏
页数:6
相关论文
共 24 条
[1]  
[Anonymous], 2014, TECH REP
[2]   Castle:: A delay-constrained scheme for ks-anonymizing data streams [J].
Cao, Jianneng ;
Carminati, Barbara ;
Ferrari, Elena ;
Tan, Kian Lee .
2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, :1376-+
[3]  
Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137
[4]   Anonymizing classification data for privacy preservation [J].
Fung, Benjamin C. M. ;
Wang, Ke ;
Yu, Philip S. .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (05) :711-725
[5]   Privacy-Preserving Data Publishing: A Survey of Recent Developments [J].
Fung, Benjamin C. M. ;
Wang, Ke ;
Chen, Rui ;
Yu, Philip S. .
ACM COMPUTING SURVEYS, 2010, 42 (04)
[6]  
Ghinita Gabriel, 2007, VLDB, V07, P758
[7]   Google's MapReduce programming model -: Revisited [J].
Laemmel, Ralf .
SCIENCE OF COMPUTER PROGRAMMING, 2008, 70 (01) :1-30
[8]   Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations [J].
Landau, Susan .
IEEE SECURITY & PRIVACY, 2014, 12 (01) :62-64
[9]   Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations [J].
Landau, Susan .
IEEE SECURITY & PRIVACY, 2013, 11 (04) :54-63
[10]  
LeFevre Kristen., 2006, ICDE, DOI DOI 10.1109/ICDE.2006.101