STUDY OF BIG DATA BASED PROBLEMS FOR DATA ANONYMIZATION

In order to defeat typical attacks like the similarity attack, the probabilistic inference attack, and others that are possible with anonymized data, we have studied different techniques. To anonymize the data set and disseminate the anonymized data set on a distributed environment without endangeri...

Full description

Saved in:
Bibliographic Details
Published inInformation Management and Computer Science Vol. 6; no. 1; pp. 17 - 21
Main Author Singh, Monika
Format Journal Article
LanguageEnglish
Published 2023
Online AccessGet full text

Cover

Loading…
Abstract In order to defeat typical attacks like the similarity attack, the probabilistic inference attack, and others that are possible with anonymized data, we have studied different techniques. To anonymize the data set and disseminate the anonymized data set on a distributed environment without endangering data privacy, a privacy-preserving distributed framework is suggested in most of the techniques. It is possible to achieve a better balance between privacy and data utility, and the data utility is demonstrated in terms of conventional measures. The privacy-preserved data set is also subjected to the application of several classifiers in order to measure the utility of the data When sharing and processing data in a distributed setting or with the Internet of Things, data privacy is a crucial requirement. High communication and computational costs are involved in collaborative privacy-preserving data mining based on secured multiparty computation. Data protection against identity revelation is achieved by the use of data anonymization, a promising technology in the field of privacy-preserving data mining. Anonymization faces significant difficulties, including information loss and frequent attacks that may be made on the anonymized data. Utilizing data mining techniques, data anonymization has recently demonstrated a considerable increase in data value. Still, the methods now in use are ineffective for dealing with attacks. Therefore, a clustering-based anonymization approach that is resistant to similarity attacks and attacks based on inference is suggested in this study. On the Hadoop Distributed File System, the anonymized data is dispersed. The technique creates a better balance between utility and privacy.
AbstractList In order to defeat typical attacks like the similarity attack, the probabilistic inference attack, and others that are possible with anonymized data, we have studied different techniques. To anonymize the data set and disseminate the anonymized data set on a distributed environment without endangering data privacy, a privacy-preserving distributed framework is suggested in most of the techniques. It is possible to achieve a better balance between privacy and data utility, and the data utility is demonstrated in terms of conventional measures. The privacy-preserved data set is also subjected to the application of several classifiers in order to measure the utility of the data When sharing and processing data in a distributed setting or with the Internet of Things, data privacy is a crucial requirement. High communication and computational costs are involved in collaborative privacy-preserving data mining based on secured multiparty computation. Data protection against identity revelation is achieved by the use of data anonymization, a promising technology in the field of privacy-preserving data mining. Anonymization faces significant difficulties, including information loss and frequent attacks that may be made on the anonymized data. Utilizing data mining techniques, data anonymization has recently demonstrated a considerable increase in data value. Still, the methods now in use are ineffective for dealing with attacks. Therefore, a clustering-based anonymization approach that is resistant to similarity attacks and attacks based on inference is suggested in this study. On the Hadoop Distributed File System, the anonymized data is dispersed. The technique creates a better balance between utility and privacy.
Author Singh, Monika
Author_xml – sequence: 1
  givenname: Monika
  surname: Singh
  fullname: Singh, Monika
BookMark eNpNj71OwzAYRS1UJErpE7D4BRL82Y7tjE6TlEhpjJowlMVy_qRItEXxxNtDWwame3WHo3se0eJ0Pg0IPQMJqeCKvEzHzocEQkooC0GGFO7QkgoQQRQLWPzrD2jt_dQSziWLJWNLJOvmPT1gk-Ok2OJUNxonus5S_LY3SZntapyb_W3XlakOu-JDN4WpntD96D79sP7LFWryrNm8BqXZFhtdBp2KIXDE9VHv-DjImCjVc8lBMkdYS8UIKmJEtK3icQc9hYgL1w-SC6Bx737fQstWiN2w3Xz2fh5G-zVPRzd_WyD2am8v9paAvdhbkJYC-wHidUlu
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.26480/imcs.01.2023.17.21
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
EISSN 2616-5961
EndPage 21
ExternalDocumentID 10_26480_imcs_01_2023_17_21
GroupedDBID AAYXX
CITATION
M~E
ID FETCH-LOGICAL-c891-a0ad5da4fe79088d474173a03b26f185306bb849c1d21546ade746129da9611b3
ISSN 2616-5961
IngestDate Fri Aug 23 00:24:13 EDT 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 1
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c891-a0ad5da4fe79088d474173a03b26f185306bb849c1d21546ade746129da9611b3
OpenAccessLink https://doi.org/10.26480/imcs.01.2023.17.21
PageCount 5
ParticipantIDs crossref_primary_10_26480_imcs_01_2023_17_21
PublicationCentury 2000
PublicationDate 2023-00-00
PublicationDateYYYYMMDD 2023-01-01
PublicationDate_xml – year: 2023
  text: 2023-00-00
PublicationDecade 2020
PublicationTitle Information Management and Computer Science
PublicationYear 2023
SSID ssib044739733
Score 2.2537792
Snippet In order to defeat typical attacks like the similarity attack, the probabilistic inference attack, and others that are possible with anonymized data, we have...
SourceID crossref
SourceType Aggregation Database
StartPage 17
Title STUDY OF BIG DATA BASED PROBLEMS FOR DATA ANONYMIZATION
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwELUQLCwIBIhvZWCDlNh14mZMaUuLaDtQpJYlshNHAkRBUBYGfjt3dpOWtkKUJUpO0SnOS87vzndnQk4rWSADT4H1Y550OdboVjJGXS2YL_1MZqlp6tPuBM07ft33-5Od6Ux1yUiVks-FdSX_QRVkgCtWyS6BbKEUBHAO-MIREIbjnzBGOjfAvJ1q6-qsFvUicLtv6zV4rd3qTR1cdHDxrDzqdDuDdut-EpF6zFPYi_LFqVQYs6SQb_iQ__9FMAZmOxOMQXvwJKfjBrao1xoWcJoC1w9tE_SSXiAbW8Zg7gOwVs5WW47nS1vgPGuJMXEOcxcfnpN37IuKT1CiosToZOLJF9tn5qMiSxD8E6MmRiWxR2NUElMRY-OANQaWBXM421_13IBwLoBelTGroBiP7TRl9FzMP8wUG5miFb1NsjH2B5zIgrtFVvRwmwgDrNNtOACsgwA6BlgnB9YBYK38B7A7pNeo9y6b7niHCzephNSVnkz9VPJMC0w3SznQO1GWXlmxIEMi5QVKVXiY0BSYGQ9kqgUHShqmEkZGVXmXrA5fhnqPOIpSoZjPBE8yHmpsq58JTyeCJUIIyfbJeT7Q-NX2MYl_eb8Hy91-SNbxwoamjsjq6O1DHwNZG6kTA9A3E7ExOw
link.rule.ids 315,783,787,4031,27935,27936,27937
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=STUDY+OF+BIG+DATA+BASED+PROBLEMS+FOR+DATA+ANONYMIZATION&rft.jtitle=Information+Management+and+Computer+Science&rft.au=Singh%2C+Monika&rft.date=2023&rft.issn=2616-5961&rft.eissn=2616-5961&rft.volume=6&rft.issue=1&rft.spage=17&rft.epage=21&rft_id=info:doi/10.26480%2Fimcs.01.2023.17.21&rft.externalDBID=n%2Fa&rft.externalDocID=10_26480_imcs_01_2023_17_21
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2616-5961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2616-5961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2616-5961&client=summon