Big data privacy: a technological perspective and review
暂无分享,去创建一个
[1] S. R,et al. Data Mining with Big Data , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).
[2] Athanasios V. Vasilakos,et al. Cloud data integrity checking with an identity-based auditing mechanism from RSA , 2016, Future Gener. Comput. Syst..
[3] Athanasios V. Vasilakos,et al. Two Schemes of Privacy-Preserving Trust Evaluation , 2016, Future Gener. Comput. Syst..
[4] Athanasios V. Vasilakos,et al. Parallel Processing Systems for Big Data: A Survey , 2016, Proceedings of the IEEE.
[5] Robert H. Deng,et al. Deduplication on Encrypted Big Data in Cloud , 2016, IEEE Transactions on Big Data.
[6] Athanasios V. Vasilakos,et al. The Quest for Privacy in the Internet of Things , 2016, IEEE Cloud Computing.
[7] Peter Groves,et al. The 'big data' revolution in healthcare: Accelerating value and innovation , 2016 .
[8] Athanasios V. Vasilakos,et al. Energy Big Data Analytics and Security: Challenges and Opportunities , 2016, IEEE Transactions on Smart Grid.
[9] Yong Xiang,et al. Protection of Big Data Privacy , 2016, IEEE Access.
[10] Athanasios V. Vasilakos,et al. When things matter: A survey on data-centric internet of things , 2016, J. Netw. Comput. Appl..
[11] Jiang Lu,et al. Robust Cyber-Physical Systems: Concept, models, and implementation , 2016, Future Gener. Comput. Syst..
[12] Stan Matwin,et al. Personal Privacy Protection in Time of Big Data , 2016, Challenges in Computational Statistics and Data Mining.
[13] Athanasios V. Vasilakos,et al. Accelerated PSO Swarm Search Feature Selection for Data Stream Mining Big Data , 2016, IEEE Transactions on Services Computing.
[14] Stathes Hadjiefthymiades,et al. An Efficient Time Optimized Scheme for Progressive Analytics in Big Data , 2015, Big Data Res..
[15] M. Haselton,et al. The Evolution of Cognitive Bias , 2015 .
[16] Athanasios V. Vasilakos,et al. Big data analytics: a survey , 2015, Journal of Big Data.
[17] Athanasios V. Vasilakos,et al. Data Mining for the Internet of Things: Literature Review and Challenges , 2015, Int. J. Distributed Sens. Networks.
[18] Jian Pei,et al. Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud , 2015, IEEE Transactions on Computers.
[19] Charu C. Aggarwal,et al. Privacy-preserving big data publishing , 2015, SSDBM.
[20] Yuguang Fang,et al. Privacy-Preserving Machine Learning Algorithms for Big Data Systems , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[21] Joseph K. Liu,et al. Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage , 2015, IEEE Transactions on Information Forensics and Security.
[22] Jinjun Chen,et al. HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications , 2015, IEEE Transactions on Parallel and Distributed Systems.
[23] Athanasios V. Vasilakos,et al. Data Analytics for Pervasive Health , 2015, Healthcare Data Analytics.
[24] Wang Weihong,et al. Secure big data storage and sharing scheme for cloud tenants , 2015, China Communications.
[25] Seog Park,et al. Hiding a Needle in a Haystack: Privacy Preserving Apriori algorithm inMapReduce Framework , 2014, PSBD '14.
[26] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[27] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[28] Jinjun Chen,et al. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.
[29] Rasool Jalili,et al. FAST: Fast Anonymization of Big Data Streams , 2014, BigDataScience '14.
[30] Joseph K. Liu,et al. Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.
[31] Athanasios V. Vasilakos,et al. TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[32] Jeff Sedayao,et al. Making Big Data, Privacy, and Anonymization Work Together in the Enterprise: Experiences and Issues , 2014, 2014 IEEE International Congress on Big Data.
[33] Zahir Tari,et al. Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.
[34] Jinjun Chen,et al. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud , 2014, IEEE Transactions on Parallel and Distributed Systems.
[35] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[36] Concealed Messages. HIDING A NEEDLE IN A HAYSTACK: , 2014 .
[37] Jinjun Chen,et al. Public Auditing for Big Data Storage in Cloud Computing -- A Survey , 2013, 2013 IEEE 16th International Conference on Computational Science and Engineering.
[38] A. S. Umesh,et al. Privacy preserving processing of data decision tree based on sample selection and Singular Value Decomposition , 2013, 2013 9th International Conference on Information Assurance and Security (IAS).
[39] Khaled El Emam,et al. Guide to the De-Identification of Personal Health Information , 2013 .
[40] Jungkyu Han,et al. A Hadoop performance model for multi-rack clusters , 2013, 2013 5th International Conference on Computer Science and Information Technology.
[41] J. Valderas,et al. Comparison of the information provided by electronic health records data and a population health survey to estimate prevalence of selected health conditions and multimorbidity , 2013, BMC Public Health.
[42] Simon Liu. Exploring the Future of Computing , 2013 .
[43] Mahesh Gudipati,et al. Big Data : Testing Approach to Overcome Quality Challenges , 2013 .
[44] Simon Fong,et al. Real-Time Clinical Decision Support System with Data Stream Mining , 2012, Journal of biomedicine & biotechnology.
[45] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[46] Roy H. Campbell,et al. Play It Again, SimMR! , 2011, 2011 IEEE International Conference on Cluster Computing.
[47] Rolf Niedermeier,et al. The Effect of Homogeneity on the Complexity of k-Anonymity , 2011, FCT.
[48] Kyungho Jeon,et al. The HybrEx Model for Confidentiality and Privacy in Cloud Computing , 2011, HotCloud.
[49] J. Manyika. Big data: The next frontier for innovation, competition, and productivity , 2011 .
[50] L. V. van't Veer,et al. Gene expression signature to improve prognosis prediction of stage II and III colorectal cancer. , 2011, Journal of clinical oncology : official journal of the American Society of Clinical Oncology.
[51] S. Shurtleff,et al. Clinical utility of microarray-based gene expression profiling in the diagnosis and subclassification of leukemia: report from the International Microarray Innovations in Leukemia Study Group. , 2010, Journal of clinical oncology : official journal of the American Society of Clinical Oncology.
[52] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[53] Ralf Lämmel,et al. Google's MapReduce programming model - Revisited , 2007, Sci. Comput. Program..
[54] Sanjay Ghemawat,et al. MapReduce: simplified data processing on large clusters , 2008, CACM.
[55] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[56] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[57] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[58] Qiang Chen,et al. Aurora : a new model and architecture for data stream management ) , 2006 .
[59] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[60] Michael Stonebraker,et al. Aurora: a new model and architecture for data stream management , 2003, The VLDB Journal.
[61] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[62] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[63] J. Mesirov,et al. Molecular classification of cancer: class discovery and class prediction by gene expression monitoring. , 1999, Science.
[64] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[65] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .