메뉴 건너뛰기




Volumn 4, Issue , 2016, Pages 1821-1834

Protection of big data privacy

Author keywords

Big data; Big data processing; Big data storage; Data auditing; Privacy

Indexed keywords

DATA PRIVACY; DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS; LIFE CYCLE;

EID: 84979828652     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2016.2558446     Document Type: Article
Times cited : (215)

References (72)
  • 2
    • 84928476745 scopus 로고    scopus 로고
    • Big data security and privacy: A review
    • Apr.
    • B. Matturdi, X. Zhou, S. Li, and F. Lin, "Big data security and privacy: A review," China Commun., vol. 11, no. 14, pp. 135-145, Apr. 2014.
    • (2014) China Commun. , vol.11 , Issue.14 , pp. 135-145
    • Matturdi, B.1    Zhou, X.2    Li, S.3    Lin, F.4
  • 3
    • 83755217707 scopus 로고    scopus 로고
    • Extracting value from chaos
    • Jun.
    • J. Gantz and D. Reinsel, "Extracting value from chaos," in Proc. IDC IView, Jun. 2011, pp. 1-12.
    • (2011) Proc. IDC IView , pp. 1-12
    • Gantz, J.1    Reinsel, D.2
  • 5
    • 84923317932 scopus 로고    scopus 로고
    • Information security in big data: Privacy and data mining
    • Oct.
    • L. Xu, C. Jiang, J.Wang, J. Yuan, and Y. Ren, "Information security in big data: Privacy and data mining," in IEEE Access, vol. 2, pp. 1149-1176, Oct. 2014.
    • (2014) IEEE Access , vol.2 , pp. 1149-1176
    • Xu, L.1    Jiang, C.2    Wang, J.3    Yuan, J.4    Ren, Y.5
  • 6
    • 84923224316 scopus 로고    scopus 로고
    • Toward scalable systems for big data analytics: A technology tutorial
    • Jul.
    • H. Hu, Y. Wen, T.-S. Chua, and X. Li, "Toward scalable systems for big data analytics: A technology tutorial," IEEE Access, vol. 2, pp. 652-687, Jul. 2014.
    • (2014) IEEE Access , vol.2 , pp. 652-687
    • Hu, H.1    Wen, Y.2    Chua, T.-S.3    Li, X.4
  • 7
    • 84877272118 scopus 로고    scopus 로고
    • Security and privacy in cloud computing
    • May
    • Z. Xiao and Y. Xiao, "Security and privacy in cloud computing," IEEE Commun. Surveys Tuts., vol. 15, no. 2, pp. 843-859, May 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.2 , pp. 843-859
    • Xiao, Z.1    Xiao, Y.2
  • 8
    • 84933038219 scopus 로고    scopus 로고
    • Secure big data storage and sharing scheme for cloud tenants
    • Jun.
    • C. Hongbing, R. Chunming, H. Kai,W.Weihong, and L. Yanyan, "Secure big data storage and sharing scheme for cloud tenants," China Commun., vol. 12, no. 6, pp. 106-115, Jun. 2015.
    • (2015) China Commun. , vol.12 , Issue.6 , pp. 106-115
    • Hongbing, C.1    Chunming, R.2    Kai, H.3    Weihong, W.4    Yanyan, L.5
  • 9
    • 84905923774 scopus 로고    scopus 로고
    • Privacy-preserving multikeyword ranked search over encrypted cloud data
    • Jan.
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multikeyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst.,vol. 25, no. 1, pp. 222-233, Jan. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.1 , pp. 222-233
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 10
    • 84979823573 scopus 로고    scopus 로고
    • Data security and privacy in cloud using RC6 and SHA algorithms
    • Jun.
    • O. M. Soundararajan, Y. Jenifer, S. Dhivya, and T. K. P. Rajagopal, "Data security and privacy in cloud using RC6 and SHA algorithms," Netw. Commun. Eng., vol. 6, no. 5, pp. 202-205, Jun. 2014.
    • (2014) Netw. Commun. Eng. , vol.6 , Issue.5 , pp. 202-205
    • Soundararajan, O.M.1    Jenifer, Y.2    Dhivya, S.3    Rajagopal, T.K.P.4
  • 11
    • 84940103492 scopus 로고    scopus 로고
    • Cloud data security using authentication and encryption technique
    • Jul.
    • S. Singla and J. Singh, "Cloud data security using authentication and encryption technique," Global J. Comput. Sci. Technol., vol. 13, no. 3, pp. 2232-2235, Jul. 2013.
    • (2013) Global J. Comput. Sci. Technol. , vol.13 , Issue.3 , pp. 2232-2235
    • Singla, S.1    Singh, J.2
  • 14
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • Oct.
    • V. Goyal, O. Pandey, A. Sahai, and B.Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Comput. Commun. Secur., Oct. 2006, pp. 89-98.
    • (2006) Proc. ACM Conf. Comput. Commun. Secur. , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 16
    • 84886903289 scopus 로고    scopus 로고
    • DAC-MACS: Effective data access control for multiauthority cloud storage systems
    • Nov.
    • K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, "DAC-MACS: Effective data access control for multiauthority cloud storage systems," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1790-1801, Nov. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.11 , pp. 1790-1801
    • Yang, K.1    Jia, X.2    Ren, K.3    Zhang, B.4    Xie, R.5
  • 17
    • 84903121888 scopus 로고    scopus 로고
    • Expressive, efficient, and revocable data access control for multi-Authority cloud storage
    • Jul.
    • K. Yang and X. Jia, "Expressive, efficient, and revocable data access control for multi-Authority cloud storage," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735-1744, Jul. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.7 , pp. 1735-1744
    • Yang, K.1    Jia, X.2
  • 18
    • 84961742903 scopus 로고    scopus 로고
    • Secure and verifiable policy update outsourcing for big data access control in the cloud
    • Dec.
    • K. Yang, X. Jia, and K. Ren, "Secure and verifiable policy update outsourcing for big data access control in the cloud," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 12, pp. 3461-3470, Dec. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.12 , pp. 3461-3470
    • Yang, K.1    Jia, X.2    Ren, K.3
  • 19
    • 33749573228 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption (without random oracles)
    • Aug.
    • X. Boyen and B.Waters, "Anonymous hierarchical identity-based encryption (without random oracles)," in Proc. Adv. Cryptol. (ASIACRYPT), vol. 4117. Aug. 2006, pp. 290-307.
    • (2006) Proc. Adv. Cryptol. (ASIACRYPT). , vol.4117 , pp. 290-307
    • Boyen, X.1    Waters, B.2
  • 20
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
    • M. Mambo and E. Okamoto, "Proxy cryptosystems: Delegation of the power to decrypt ciphertexts," Fundam. Electron., Commun. Comput. Sci., vol. E80-A, no. 1, pp. 54-63, 1997.
    • (1997) Fundam. Electron., Commun. Comput. Sci. , vol.E80-A , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 23
    • 84864797570 scopus 로고    scopus 로고
    • Anonymous ID-based proxy re-encryption
    • Jul.
    • J. Shao, "Anonymous ID-based proxy re-encryption," in Proc. Int. Conf. Inf. Secur. Privacy, vol. 7372. Jul. 2012, pp. 364-375.
    • (2012) Proc. Int. Conf. Inf. Secur. Privacy , vol.7372 , pp. 364-375
    • Shao, J.1
  • 24
    • 84933040096 scopus 로고    scopus 로고
    • Privacy-preserving ciphertext multisharing control for big data storage
    • Aug.
    • K. Liang, W. Susilo, and J. K. Liu, "Privacy-preserving ciphertext multisharing control for big data storage," IEEE Trans. Inf. Forensics Security, vol. 10, no. 8, pp. 1578-1589, Aug. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.8 , pp. 1578-1589
    • Liang, K.1    Susilo, W.2    Liu, J.K.3
  • 25
    • 77649261628 scopus 로고    scopus 로고
    • Ph.D. Dissertation, Dept. Comput. Sci., Stanford Univ., Stanford, CA, USA
    • C. Gentry, "A fully homomorphic encryption scheme," Ph.D. Dissertation, Dept. Comput. Sci., Stanford Univ., Stanford, CA, USA, 2009.
    • (2009) A Fully Homomorphic Encryption Scheme
    • Gentry, C.1
  • 26
    • 84970003207 scopus 로고    scopus 로고
    • Trustworthy processing of healthcare big data in hybrid clouds
    • Mar./Apr.
    • S. Nepal, R. Ranjan, and K.-K. R. Choo, "Trustworthy processing of healthcare big data in hybrid clouds," IEEE Trans. Cloud Comput., vol. 2, no. 2, pp. 78-84, Mar./Apr. 2015.
    • (2015) IEEE Trans. Cloud Comput. , vol.2 , Issue.2 , pp. 78-84
    • Nepal, S.1    Ranjan, R.2    Choo, K.-K.R.3
  • 27
    • 84904510325 scopus 로고    scopus 로고
    • Achieving big data privacy via hybrid cloud
    • Apr.
    • X. Huang and X. Du, "Achieving big data privacy via hybrid cloud," in Proc. Int. Conf. INFOCOM, Apr. 2014, pp. 512-517.
    • (2014) Proc. Int. Conf. INFOCOM , pp. 512-517
    • Huang, X.1    Du, X.2
  • 28
    • 84906247213 scopus 로고    scopus 로고
    • Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates
    • Sep.
    • C. Liu et al., "Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 9, pp. 2234-2244, Sep. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.9 , pp. 2234-2244
    • Liu, C.1
  • 30
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • Jan.
    • R. C. Merkle, "A digital signature based on a conventional encryption function," in Proc. Adv. Cryptol. (CRYPTO), Jan. 1988, pp. 369-378.
    • (1988) Proc. Adv. Cryptol. (CRYPTO). , pp. 369-378
    • Merkle, R.C.1
  • 33
    • 79959823910 scopus 로고    scopus 로고
    • Remote data checking using provable data possession
    • May
    • G. Ateniese et al., "Remote data checking using provable data possession," Trans. Inf. Syst. Secur., vol. 14, no. 1, May 2011, Art. no. 12.
    • (2011) Trans. Inf. Syst. Secur. , vol.14 , Issue.1
    • Ateniese, G.1
  • 36
    • 79953294892 scopus 로고    scopus 로고
    • Enabling public auditability and data dynamics for storage security in cloud computing
    • May
    • Q.Wang, C.Wang, K. Ren,W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Li, J.4
  • 37
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • Mar.
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. IEEE Int. Conf. INFOCOM, Mar. 2010, pp. 1-9.
    • (2010) Proc. IEEE Int. Conf. INFOCOM , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 38
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • Jun.
    • B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM Comput. Surv., vol. 42, no. 4, Jun. 2010, Art. no. 14.
    • (2010) ACM Comput. Surv. , vol.42 , Issue.4
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 39
    • 84918548025 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: An overview
    • R. C. W. Wong and A. W.-C. Fu, "Privacy-preserving data publishing: An overview," Synth. Lectures Data Manage., vol. 2, no. 1, pp. 1-138, 2010.
    • (2010) Synth. Lectures Data Manage. , vol.2 , Issue.1 , pp. 1-138
    • Wong, R.C.W.1    Fu, A.W.-C.2
  • 41
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal -Anonymization
    • Apr.
    • R. J. Bayardo and R. Agrawal, "Data privacy through optimal -Anonymization," in Proc. Int. Conf. Data Eng., Apr. 2005, pp. 217-228.
    • (2005) Proc. Int. Conf. Data Eng. , pp. 217-228
    • Bayardo, R.J.1    Agrawal, R.2
  • 43
    • 41849123637 scopus 로고    scopus 로고
    • Utility-based anonymization for privacy preservation with less information loss
    • Dec.
    • J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu, "Utility-based anonymization for privacy preservation with less information loss," ACM SIGKDD Explorations Newslett., vol. 8, no. 2, pp. 21-30, Dec. 2006.
    • (2006) ACM SIGKDD Explorations Newslett. , vol.8 , Issue.2 , pp. 21-30
    • Xu, J.1    Wang, W.2    Pei, J.3    Wang, X.4    Shi, B.5    Fu, A.W.-C.6
  • 44
    • 69549119179 scopus 로고    scopus 로고
    • Anonymization with minimal loss of information
    • Feb.
    • A. Gionis and T. Tassa, "anonymization with minimal loss of information," IEEE Trans. Knowl. Data Eng., vol. 21, no. 2, pp. 206-219, Feb. 2009.
    • (2009) IEEE Trans. Knowl. Data Eng. , vol.21 , Issue.2 , pp. 206-219
    • Gionis, A.1    Tassa, T.2
  • 45
    • 84942327005 scopus 로고    scopus 로고
    • Privacy or utility in data collection A contract theoretic approach
    • Oct.
    • L. Xu, C. Jiang, Y. Chen, Y. Ren, and K. J. Ray Liu, "Privacy or utility in data collection A contract theoretic approach," IEEE J. Sel. Topics Signal Process., vol. 9, no. 7, pp. 1256-1269, Oct. 2015.
    • (2015) IEEE J. Sel. Topics Signal Process. , vol.9 , Issue.7 , pp. 1256-1269
    • Xu, L.1    Jiang, C.2    Chen, Y.3    Ren, Y.4    Ray Liu, K.J.5
  • 46
    • 84893405732 scopus 로고    scopus 로고
    • Data clustering: A review
    • Sep.
    • A. K. Jain, M. N. Murty, and P. J. Flynn, "Data clustering: A review," ACM Comput. Surv., vol. 31, no. 3, pp. 264-323, Sep. 1999.
    • (1999) ACM Comput. Surv. , vol.31 , Issue.3 , pp. 264-323
    • Jain, A.K.1    Murty, M.N.2    Flynn, P.J.3
  • 47
    • 70349335150 scopus 로고    scopus 로고
    • New York, NY, USA: Wiley
    • R. Xu and D. Wunsch, Clustering. New York, NY, USA: Wiley, 2009.
    • (2009) Clustering
    • Xu, R.1    Wunsch, D.2
  • 48
    • 84908602473 scopus 로고    scopus 로고
    • A survey of clustering algorithms for big data: Taxonomy and empirical analysis
    • Sep.
    • A. Fahad et al., "A survey of clustering algorithms for big data: Taxonomy and empirical analysis," IEEE Trans. Emerg. Topics Comput., vol. 2, no. 3, pp. 267-279, Sep. 2014.
    • (2014) IEEE Trans. Emerg. Topics Comput. , vol.2 , Issue.3 , pp. 267-279
    • Fahad, A.1
  • 51
    • 84873151200 scopus 로고    scopus 로고
    • CloudVista: Interactive and economical visual cluster analysis for big data in the cloud
    • H. Xu, Z. Li, S. Guo, and K. Chen, "CloudVista: Interactive and economical visual cluster analysis for big data in the cloud," in Proc. VLDB Endowment, 2012, pp. 1886-1889.
    • (2012) Proc. VLDB Endowment , pp. 1886-1889
    • Xu, H.1    Li, Z.2    Guo, S.3    Chen, K.4
  • 52
    • 78649884242 scopus 로고    scopus 로고
    • Privacy preserving distributed learning clustering of healthcare data using cryptography protocols
    • Jul.
    • A. M. Elmisery and H. Fu, "Privacy preserving distributed learning clustering of healthcare data using cryptography protocols," in Proc. IEEE 34th Annu. Comput. Softw. Appl. Conf. Workshops, Jul. 2010, pp. 140-145.
    • (2010) Proc. IEEE 34th Annu. Comput. Softw. Appl. Conf. Workshops , pp. 140-145
    • Elmisery, A.M.1    Fu, H.2
  • 53
    • 84876035763 scopus 로고    scopus 로고
    • Turning big data into tiny data: Constant-size coresets for k-means, PCA and projective clustering
    • D. Feldman, M. Schmidt, and C. Sohler, "Turning big data into tiny data: Constant-size coresets for k-means, PCA and projective clustering," in Proc. ACM-SIAM Symp. Discrete Algorithms, 2013, pp. 1434-1453.
    • (2013) Proc. ACM-SIAM Symp. Discrete Algorithms , pp. 1434-1453
    • Feldman, D.1    Schmidt, M.2    Sohler, C.3
  • 55
    • 28844447994 scopus 로고    scopus 로고
    • Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation
    • S. R. M. Oliveira and O. R. Zaane, "Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation," in Proc. ICDM Workshop Privacy Security Aspects Data Mining, 2004, pp. 40-46.
    • (2004) Proc. ICDM Workshop Privacy Security Aspects Data Mining , pp. 40-46
    • Oliveira, S.R.M.1    Zaane, O.R.2
  • 56
    • 84903288977 scopus 로고    scopus 로고
    • Distributed information theoretic clustering
    • Jul.
    • P. Shen and C. Li, "Distributed information theoretic clustering," IEEE Trans. Signal Process., vol. 62, no. 13, pp. 3442-3453, Jul. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.13 , pp. 3442-3453
    • Shen, P.1    Li, C.2
  • 57
    • 84897696286 scopus 로고    scopus 로고
    • Distributed online Big Data classi-cation using context information
    • Oct.
    • C. Tekin and M. Van Der Schaar, "Distributed online Big Data classi-cation using context information," in Proc. Int. Conf. Commun., Control, Comput., Oct. 2013, pp. 1435-1442.
    • (2013) Proc. Int. Conf. Commun., Control, Comput. , pp. 1435-1442
    • Tekin, C.1    Van Der Schaar, M.2
  • 61
    • 28444434728 scopus 로고    scopus 로고
    • A framework for high-Accuracy privacypreserving mining
    • Apr.
    • S. Agrawal and J. R. Haritsa, "A framework for high-Accuracy privacypreserving mining," in Proc. 21st Int. Conf. Data Eng., Apr. 2005, pp. 193-204.
    • (2005) Proc. 21st Int. Conf. Data Eng. , pp. 193-204
    • Agrawal, S.1    Haritsa, J.R.2
  • 62
    • 33645450094 scopus 로고    scopus 로고
    • Privacy preserving classification mining
    • G. Weiping, W. Wei, and Z. Haofeng, "Privacy preserving classification mining," J. Comput. Res. Develop., vol. 43, no. 1, pp. 39-45, 2006.
    • (2006) J. Comput. Res. Develop. , vol.43 , Issue.1 , pp. 39-45
    • Weiping, G.1    Wei, W.2    Haofeng, Z.3
  • 63
    • 78650467990 scopus 로고    scopus 로고
    • Research on privacy preserving classification data mining based on random perturbation
    • X. Zhang and H. Bi, "Research on privacy preserving classification data mining based on random perturbation," in Proc. Int. Conf. Inf. Netw. Autom., 2010, pp. 173-178.
    • (2010) Proc. Int. Conf. Inf. Netw. Autom. , pp. 173-178
    • Zhang, X.1    Bi, H.2
  • 67
    • 84923917782 scopus 로고    scopus 로고
    • Reducing the search space for big data mining for interesting patterns from uncertain data
    • Jun./Jul.
    • C. K.-S. Leung, R. K. MacKinnon, and F. Jiang, "Reducing the search space for big data mining for interesting patterns from uncertain data," in Proc. Int. Conf. Big Data, Jun./Jul. 2014, pp. 315-322.
    • (2014) Proc. Int. Conf. Big Data , pp. 315-322
    • Leung, C.K.-S.1    MacKinnon, R.K.2    Jiang, F.3
  • 71
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas, "Privacy preserving data mining," in Proc. Adv. Cryptol., 2000, pp. 36-54.
    • (2000) Proc. Adv. Cryptol. , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 72
    • 84908019121 scopus 로고    scopus 로고
    • Big data opportunities and challenges: Discussions from data analytics perspectives [discussion forum]
    • Nov.
    • Z.-H. Zhou, N.-V. Chawla, Y. Jin, and G. J. Williams, "Big data opportunities and challenges: Discussions from data analytics perspectives [discussion forum]," IEEE Comput. Intell. Mag., vol. 9, no. 4, pp. 62-74, Nov. 2014.
    • (2014) IEEE Comput. Intell. Mag. , vol.9 , Issue.4 , pp. 62-74
    • Zhou, Z.-H.1    Chawla, N.-V.2    Jin, Y.3    Williams, G.J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.