A survey of security and privacy in big data

Big data has been arising a growing interest in both scientific and industrial fields for its potential value. However, before employing big data technology into massive applications, a basic but also principle topic should be investigated: security and privacy. In this paper, the recent research and development on security and privacy in big data is surveyed. First, the effects of characteristics of big data on information security and privacy are described. Then, topics and issues on security are discussed and reviewed. Further, privacy-preserving trajectory data publishing is studied due to its future utilization, especially in telecom operation.

[1]  Zhou Xiaoguang,et al.  Challenges and solutions of information security issues in the age of big data , 2016, China Communications.

[2]  Jemal H. Abawajy,et al.  Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.

[3]  Panos Kalnis,et al.  Providing K-Anonymity in location based services , 2010, SKDD.

[4]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[5]  Li Shuai,et al.  Big Data security and privacy: A review , 2014, China Communications.

[6]  Ashish Aggarwal,et al.  Secure Data Mining in Cloud Using Homomorphic Encryption , 2014, 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[7]  Nikos Mamoulis,et al.  Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[8]  Francesco Bonchi,et al.  Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[9]  Laks V. S. Lakshmanan,et al.  Trajectory anonymity in publishing personal mobility data , 2011, SKDD.

[10]  Yue Gao,et al.  Differentially private publication of general time-serial trajectory data , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[11]  Yu Zheng,et al.  Trajectory Data Mining , 2015, ACM Trans. Intell. Syst. Technol..

[12]  Tao Zhang,et al.  A novel Big Data based Telecom Operation architecture , 2016 .

[13]  Ranjan K. Mallik,et al.  Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Information Forensics and Security.

[14]  Xu Jian,et al.  A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data , 2014, TrustCom 2014.

[15]  Francesco Bonchi,et al.  Anonymization of moving objects databases by clustering and perturbation , 2010, Inf. Syst..

[16]  Cédric Lauradoux,et al.  Time Distortion Anonymization for the Publication of Mobility Data with High Utility , 2015, TrustCom 2015.

[17]  Mohammad Ali Nematbakhsh,et al.  A Survey on Security Issues in Big Data and NoSQL , 2015 .

[18]  Seref Sagiroglu,et al.  A survey on security and privacy issues in big data , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[19]  Yücel Saygin,et al.  Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.

[20]  Elisa Bertino,et al.  Big Data - Security and Privacy , 2015, 2015 IEEE International Congress on Big Data.

[21]  Chunxiao Jiang,et al.  Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.

[22]  K. Premalatha,et al.  A survey on privacy preserving data mining , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).

[23]  Ken Mano,et al.  Pseudonym exchange for privacy-preserving publishing of trajectory data set , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).

[24]  Taghi M. Khoshgoftaar,et al.  Survey of Clinical Data Mining Applications on Big Data in Health Informatics , 2013, 2013 12th International Conference on Machine Learning and Applications.

[25]  Wei Tian,et al.  A Survey of Privacy Preserving Data Publishing using Generalization and Suppression , 2014 .

[26]  Arumugam Nallanathan,et al.  Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game , 2016, IEEE Communications Letters.

[27]  Pingshui Wang A Survey on Privacy Preserving Data Mining , 2009, 2009 First International Workshop on Database Technology and Applications.

[28]  Daniel A. Spielman,et al.  Spectral Graph Theory and its Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[29]  Benjamin C. M. Fung,et al.  Differentially Private Trajectory Data Publication , 2011, ArXiv.

[30]  Laks V. S. Lakshmanan,et al.  Anonymizing moving objects: how to hide a MOB in a crowd? , 2009, EDBT '09.

[31]  Peter J. Hunter,et al.  Big Data, Big Knowledge: Big Data for Personalized Healthcare , 2015, IEEE Journal of Biomedical and Health Informatics.

[32]  Norizan Mohd Yasin,et al.  International Journal of Physical Sciences Privacy Preserving Data Publishing: Review , 2022 .

[33]  Alvaro A. Cárdenas,et al.  Big Data Analytics for Security , 2013, IEEE Security & Privacy.

[34]  Elisa Bertino,et al.  Big Data - Security and Privacy , 2015, 2015 IEEE International Congress on Big Data.

[35]  Arumugam Nallanathan,et al.  Enhancing Secrecy Rate in Cognitive Radio Networks via Stackelberg Game , 2016, IEEE Transactions on Communications.

[36]  Junqiang Liu Privacy Preserving Data Publishing: Current Status and New Directions , 2012 .

[37]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[38]  Joseph K. Liu,et al.  Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.

[39]  Claude Castelluccia,et al.  Differentially private sequential data publication via variable-length n-grams , 2012, CCS.

[40]  Jie Gao,et al.  WCDMA data based LTE site selection scheme in LTE deployment , 2016 .

[41]  Kunal Talwar,et al.  Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[42]  Jian Xu,et al.  A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[43]  Spiros Skiadopoulos,et al.  Distance-Based k^m-Anonymization of Trajectory Data , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.

[44]  Lifeng Wang,et al.  Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.