STUDY OF BIG DATA BASED PROBLEMS FOR DATA ANONYMIZATION
In order to defeat typical attacks like the similarity attack, the probabilistic inference attack, and others that are possible with anonymized data, we have studied different techniques. To anonymize the data set and disseminate the anonymized data set on a distributed environment without endangeri...
Saved in:
Published in | Information Management and Computer Science Vol. 6; no. 1; pp. 17 - 21 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
2023
|
Online Access | Get full text |
Cover
Loading…
Abstract | In order to defeat typical attacks like the similarity attack, the probabilistic inference attack, and others that are possible with anonymized data, we have studied different techniques. To anonymize the data set and disseminate the anonymized data set on a distributed environment without endangering data privacy, a privacy-preserving distributed framework is suggested in most of the techniques. It is possible to achieve a better balance between privacy and data utility, and the data utility is demonstrated in terms of conventional measures. The privacy-preserved data set is also subjected to the application of several classifiers in order to measure the utility of the data When sharing and processing data in a distributed setting or with the Internet of Things, data privacy is a crucial requirement. High communication and computational costs are involved in collaborative privacy-preserving data mining based on secured multiparty computation. Data protection against identity revelation is achieved by the use of data anonymization, a promising technology in the field of privacy-preserving data mining. Anonymization faces significant difficulties, including information loss and frequent attacks that may be made on the anonymized data. Utilizing data mining techniques, data anonymization has recently demonstrated a considerable increase in data value. Still, the methods now in use are ineffective for dealing with attacks. Therefore, a clustering-based anonymization approach that is resistant to similarity attacks and attacks based on inference is suggested in this study. On the Hadoop Distributed File System, the anonymized data is dispersed. The technique creates a better balance between utility and privacy. |
---|---|
AbstractList | In order to defeat typical attacks like the similarity attack, the probabilistic inference attack, and others that are possible with anonymized data, we have studied different techniques. To anonymize the data set and disseminate the anonymized data set on a distributed environment without endangering data privacy, a privacy-preserving distributed framework is suggested in most of the techniques. It is possible to achieve a better balance between privacy and data utility, and the data utility is demonstrated in terms of conventional measures. The privacy-preserved data set is also subjected to the application of several classifiers in order to measure the utility of the data When sharing and processing data in a distributed setting or with the Internet of Things, data privacy is a crucial requirement. High communication and computational costs are involved in collaborative privacy-preserving data mining based on secured multiparty computation. Data protection against identity revelation is achieved by the use of data anonymization, a promising technology in the field of privacy-preserving data mining. Anonymization faces significant difficulties, including information loss and frequent attacks that may be made on the anonymized data. Utilizing data mining techniques, data anonymization has recently demonstrated a considerable increase in data value. Still, the methods now in use are ineffective for dealing with attacks. Therefore, a clustering-based anonymization approach that is resistant to similarity attacks and attacks based on inference is suggested in this study. On the Hadoop Distributed File System, the anonymized data is dispersed. The technique creates a better balance between utility and privacy. |
Author | Singh, Monika |
Author_xml | – sequence: 1 givenname: Monika surname: Singh fullname: Singh, Monika |
BookMark | eNpNj71OwzAYRS1UJErpE7D4BRL82Y7tjE6TlEhpjJowlMVy_qRItEXxxNtDWwame3WHo3se0eJ0Pg0IPQMJqeCKvEzHzocEQkooC0GGFO7QkgoQQRQLWPzrD2jt_dQSziWLJWNLJOvmPT1gk-Ok2OJUNxonus5S_LY3SZntapyb_W3XlakOu-JDN4WpntD96D79sP7LFWryrNm8BqXZFhtdBp2KIXDE9VHv-DjImCjVc8lBMkdYS8UIKmJEtK3icQc9hYgL1w-SC6Bx737fQstWiN2w3Xz2fh5G-zVPRzd_WyD2am8v9paAvdhbkJYC-wHidUlu |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.26480/imcs.01.2023.17.21 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 2616-5961 |
EndPage | 21 |
ExternalDocumentID | 10_26480_imcs_01_2023_17_21 |
GroupedDBID | AAYXX CITATION M~E |
ID | FETCH-LOGICAL-c891-a0ad5da4fe79088d474173a03b26f185306bb849c1d21546ade746129da9611b3 |
ISSN | 2616-5961 |
IngestDate | Fri Aug 23 00:24:13 EDT 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c891-a0ad5da4fe79088d474173a03b26f185306bb849c1d21546ade746129da9611b3 |
OpenAccessLink | https://doi.org/10.26480/imcs.01.2023.17.21 |
PageCount | 5 |
ParticipantIDs | crossref_primary_10_26480_imcs_01_2023_17_21 |
PublicationCentury | 2000 |
PublicationDate | 2023-00-00 |
PublicationDateYYYYMMDD | 2023-01-01 |
PublicationDate_xml | – year: 2023 text: 2023-00-00 |
PublicationDecade | 2020 |
PublicationTitle | Information Management and Computer Science |
PublicationYear | 2023 |
SSID | ssib044739733 |
Score | 2.2537792 |
Snippet | In order to defeat typical attacks like the similarity attack, the probabilistic inference attack, and others that are possible with anonymized data, we have... |
SourceID | crossref |
SourceType | Aggregation Database |
StartPage | 17 |
Title | STUDY OF BIG DATA BASED PROBLEMS FOR DATA ANONYMIZATION |
Volume | 6 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwELUQLCwIBIhvZWCDlNh14mZMaUuLaDtQpJYlshNHAkRBUBYGfjt3dpOWtkKUJUpO0SnOS87vzndnQk4rWSADT4H1Y550OdboVjJGXS2YL_1MZqlp6tPuBM07ft33-5Od6Ux1yUiVks-FdSX_QRVkgCtWyS6BbKEUBHAO-MIREIbjnzBGOjfAvJ1q6-qsFvUicLtv6zV4rd3qTR1cdHDxrDzqdDuDdut-EpF6zFPYi_LFqVQYs6SQb_iQ__9FMAZmOxOMQXvwJKfjBrao1xoWcJoC1w9tE_SSXiAbW8Zg7gOwVs5WW47nS1vgPGuJMXEOcxcfnpN37IuKT1CiosToZOLJF9tn5qMiSxD8E6MmRiWxR2NUElMRY-OANQaWBXM421_13IBwLoBelTGroBiP7TRl9FzMP8wUG5miFb1NsjH2B5zIgrtFVvRwmwgDrNNtOACsgwA6BlgnB9YBYK38B7A7pNeo9y6b7niHCzephNSVnkz9VPJMC0w3SznQO1GWXlmxIEMi5QVKVXiY0BSYGQ9kqgUHShqmEkZGVXmXrA5fhnqPOIpSoZjPBE8yHmpsq58JTyeCJUIIyfbJeT7Q-NX2MYl_eb8Hy91-SNbxwoamjsjq6O1DHwNZG6kTA9A3E7ExOw |
link.rule.ids | 315,783,787,4031,27935,27936,27937 |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=STUDY+OF+BIG+DATA+BASED+PROBLEMS+FOR+DATA+ANONYMIZATION&rft.jtitle=Information+Management+and+Computer+Science&rft.au=Singh%2C+Monika&rft.date=2023&rft.issn=2616-5961&rft.eissn=2616-5961&rft.volume=6&rft.issue=1&rft.spage=17&rft.epage=21&rft_id=info:doi/10.26480%2Fimcs.01.2023.17.21&rft.externalDBID=n%2Fa&rft.externalDocID=10_26480_imcs_01_2023_17_21 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2616-5961&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2616-5961&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2616-5961&client=summon |