Anonymization in the time of big data

被引:0
|
作者
Domingo-Ferrer J. [1 ]
Soria-Comas J. [1 ]
机构
[1] Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Av. Països Catalans 26, Tarragona, 43007, CA
关键词
Big data; Curse of dimensionality; Data anonymization; K-anonymity; Multiple releases;
D O I
10.1007/978-3-319-45381-15
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we explore how viable is anonymization to prevent disclosure in structured big data. For the sake of concreteness, we focus on k-anonymity, which is the best-known privacy model based on anonymization. We identify two main challenges to use k-anonymity in big data. First, confidential attributes can also be quasi-identifier attributes, which increases the number of quasi-identifier attributes and may lead to a large information loss to attain k-anonymity. Second, in big data there is an unlimited number of data controllers, who may publish independent k-anonymous releases on overlapping populations of subjects; the k-anonymity guarantee does not longer hold if an observer pools such independent releases. We propose solutions to deal with the above two challenges. Our conclusion is that, with the proposed adjustments, k-anonymity is still useful in a context of big data. © Springer International Publishing Switzerland 2016.
引用
收藏
页码:57 / 68
页数:11
相关论文
共 50 条
  • [21] An Efficient Big Data Anonymization Algorithm Based on Chaos and Perturbation Techniques
    Eyupoglu, Can
    Aydin, Muhammed Ali
    Zaim, Abdul Halim
    Sertbas, Ahmet
    ENTROPY, 2018, 20 (05)
  • [22] Two-phase Entropy based approach to Big Data Anonymization
    Ranjan, Ashish
    Ranjan, Prabhat
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 76 - 81
  • [23] Toward Scalable Anonymization for Privacy-Preserving Big Data Publishing
    Mehta, Brijesh B.
    Rao, Udai Pratap
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2, 2018, 708 : 297 - 304
  • [24] Privacy Preserving Big data Using Combine Anonymization and Encryption Approach
    Desai, Vidhi
    Chauhan, Gargi K.
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,
  • [25] Towards an Ontology-Based definition of Data Anonymization Policy for Cloud Computing and Big Data
    Matsunaga, Roberta Mayumi
    Ricarte, Ivan
    Basso, Tania
    Moraes, Regina
    2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2017), 2017, : 75 - 82
  • [26] Clustering based privacy preserving of big data using fuzzification and anonymization operation
    Khan S.
    Iqbal K.
    Faizullah S.
    Fahad M.
    Ali J.
    Ahmed W.
    International Journal of Advanced Computer Science and Applications, 2019, 10 (12): : 282 - 289
  • [27] Representing a Model for the Anonymization of Big Data Stream Using In-Memory Processing
    Shamsinejad E.
    Banirostam T.
    Pedram M.M.
    Rahmani A.M.
    Annals of Data Science, 2025, 12 (1) : 223 - 252
  • [28] Clustering based Privacy Preserving of Big Data using Fuzzification and Anonymization Operation
    Khan, Saira
    Iqba, Khalid
    Faizullah, Safi
    Fahad, Muhammad
    Ali, Jawad
    Ahmed, Waqas
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 282 - 289
  • [29] Making Big Data, Privacy, and Anonymization work together in the Enterprise: Experiences and Issues
    Sedayao, Jeff
    Bhardwaj, Rahul
    Gorade, Nakul
    2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS), 2014, : 600 - 606
  • [30] IoT Security for Utilization of Big Data: Mutual Authentication Technology and Anonymization Technology for Positional Data
    Shinzaki, Takashi
    Morikawa, Ikuya
    Yamaoka, Yuji
    Sakemi, Yumi
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2016, 52 (04): : 52 - 60