Big data privacy: a technological perspective and review

[1]  S. R,et al.  Data Mining with Big Data , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).

[2]  Athanasios V. Vasilakos,et al.  Cloud data integrity checking with an identity-based auditing mechanism from RSA , 2016, Future Gener. Comput. Syst..

[3]  Athanasios V. Vasilakos,et al.  Two Schemes of Privacy-Preserving Trust Evaluation , 2016, Future Gener. Comput. Syst..

[4]  Athanasios V. Vasilakos,et al.  Parallel Processing Systems for Big Data: A Survey , 2016, Proceedings of the IEEE.

[5]  Robert H. Deng,et al.  Deduplication on Encrypted Big Data in Cloud , 2016, IEEE Transactions on Big Data.

[6]  Athanasios V. Vasilakos,et al.  The Quest for Privacy in the Internet of Things , 2016, IEEE Cloud Computing.

[7]  Peter Groves,et al.  The 'big data' revolution in healthcare: Accelerating value and innovation , 2016 .

[8]  Athanasios V. Vasilakos,et al.  Energy Big Data Analytics and Security: Challenges and Opportunities , 2016, IEEE Transactions on Smart Grid.

[9]  Yong Xiang,et al.  Protection of Big Data Privacy , 2016, IEEE Access.

[10]  Athanasios V. Vasilakos,et al.  When things matter: A survey on data-centric internet of things , 2016, J. Netw. Comput. Appl..

[11]  Jiang Lu,et al.  Robust Cyber-Physical Systems: Concept, models, and implementation , 2016, Future Gener. Comput. Syst..

[12]  Stan Matwin,et al.  Personal Privacy Protection in Time of Big Data , 2016, Challenges in Computational Statistics and Data Mining.

[13]  Athanasios V. Vasilakos,et al.  Accelerated PSO Swarm Search Feature Selection for Data Stream Mining Big Data , 2016, IEEE Transactions on Services Computing.

[14]  Stathes Hadjiefthymiades,et al.  An Efficient Time Optimized Scheme for Progressive Analytics in Big Data , 2015, Big Data Res..

[15]  M. Haselton,et al.  The Evolution of Cognitive Bias , 2015 .

[16]  Athanasios V. Vasilakos,et al.  Big data analytics: a survey , 2015, Journal of Big Data.

[17]  Athanasios V. Vasilakos,et al.  Data Mining for the Internet of Things: Literature Review and Challenges , 2015, Int. J. Distributed Sens. Networks.

[18]  Jian Pei,et al.  Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud , 2015, IEEE Transactions on Computers.

[19]  Charu C. Aggarwal,et al.  Privacy-preserving big data publishing , 2015, SSDBM.

[20]  Yuguang Fang,et al.  Privacy-Preserving Machine Learning Algorithms for Big Data Systems , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[21]  Joseph K. Liu,et al.  Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage , 2015, IEEE Transactions on Information Forensics and Security.

[22]  Jinjun Chen,et al.  HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications , 2015, IEEE Transactions on Parallel and Distributed Systems.

[23]  Athanasios V. Vasilakos,et al.  Data Analytics for Pervasive Health , 2015, Healthcare Data Analytics.

[24]  Wang Weihong,et al.  Secure big data storage and sharing scheme for cloud tenants , 2015, China Communications.

[25]  Seog Park,et al.  Hiding a Needle in a Haystack: Privacy Preserving Apriori algorithm inMapReduce Framework , 2014, PSBD '14.

[26]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[27]  Chunxiao Jiang,et al.  Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.

[28]  Jinjun Chen,et al.  Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.

[29]  Rasool Jalili,et al.  FAST: Fast Anonymization of Big Data Streams , 2014, BigDataScience '14.

[30]  Joseph K. Liu,et al.  Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.

[31]  Athanasios V. Vasilakos,et al.  TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[32]  Jeff Sedayao,et al.  Making Big Data, Privacy, and Anonymization Work Together in the Enterprise: Experiences and Issues , 2014, 2014 IEEE International Congress on Big Data.

[33]  Zahir Tari,et al.  Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.

[34]  Jinjun Chen,et al.  A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud , 2014, IEEE Transactions on Parallel and Distributed Systems.

[35]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[36]  Concealed Messages HIDING A NEEDLE IN A HAYSTACK: , 2014 .

[37]  Jinjun Chen,et al.  Public Auditing for Big Data Storage in Cloud Computing -- A Survey , 2013, 2013 IEEE 16th International Conference on Computational Science and Engineering.

[38]  A. S. Umesh,et al.  Privacy preserving processing of data decision tree based on sample selection and Singular Value Decomposition , 2013, 2013 9th International Conference on Information Assurance and Security (IAS).

[39]  Khaled El Emam,et al.  Guide to the De-Identification of Personal Health Information , 2013 .

[40]  Jungkyu Han,et al.  A Hadoop performance model for multi-rack clusters , 2013, 2013 5th International Conference on Computer Science and Information Technology.

[41]  J. Valderas,et al.  Comparison of the information provided by electronic health records data and a population health survey to estimate prevalence of selected health conditions and multimorbidity , 2013, BMC Public Health.

[42]  Simon Liu Exploring the Future of Computing , 2013 .

[43]  Mahesh Gudipati,et al.  Big Data : Testing Approach to Overcome Quality Challenges , 2013 .

[44]  Simon Fong,et al.  Real-Time Clinical Decision Support System with Data Stream Mining , 2012, Journal of biomedicine & biotechnology.

[45]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[46]  Roy H. Campbell,et al.  Play It Again, SimMR! , 2011, 2011 IEEE International Conference on Cluster Computing.

[47]  Rolf Niedermeier,et al.  The Effect of Homogeneity on the Complexity of k-Anonymity , 2011, FCT.

[48]  Kyungho Jeon,et al.  The HybrEx Model for Confidentiality and Privacy in Cloud Computing , 2011, HotCloud.

[49]  J. Manyika Big data: The next frontier for innovation, competition, and productivity , 2011 .

[50]  L. V. van't Veer,et al.  Gene expression signature to improve prognosis prediction of stage II and III colorectal cancer. , 2011, Journal of clinical oncology : official journal of the American Society of Clinical Oncology.

[51]  S. Shurtleff,et al.  Clinical utility of microarray-based gene expression profiling in the diagnosis and subclassification of leukemia: report from the International Microarray Innovations in Leukemia Study Group. , 2010, Journal of clinical oncology : official journal of the American Society of Clinical Oncology.

[52]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[53]  Ralf Lämmel,et al.  Google's MapReduce programming model - Revisited , 2007, Sci. Comput. Program..

[54]  Sanjay Ghemawat,et al.  MapReduce: simplified data processing on large clusters , 2008, CACM.

[55]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[56]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[57]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[58]  Qiang Chen,et al.  Aurora : a new model and architecture for data stream management ) , 2006 .

[59]  Adam Meyerson,et al.  On the complexity of optimal K-anonymity , 2004, PODS.

[60]  Michael Stonebraker,et al.  Aurora: a new model and architecture for data stream management , 2003, The VLDB Journal.

[61]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[62]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[63]  J. Mesirov,et al.  Molecular classification of cancer: class discovery and class prediction by gene expression monitoring. , 1999, Science.

[64]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[65]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .