Privacy Preserving Big Data publishing- A scalable K-anonymization approach using MapReduce

Networked data contain interconnected entities for which inferences are to be made. For example, web pages are interconnected by hyperlinks, research papers are associated by references, phone accounts are linked by calls, and conceivable terrorists are linked by communications. Networks have turned out to be ubiquitous. Correspondence networks, financial transaction networks, networks portraying physical systems, and social networks are all ending up noticeably progressively important in our everyday life. Regularly, we are interested in models of how nodes in the system influence each other (for example, who taints whom in an epidemiological system), models for predicting an attribute of intrigue in light of observed attributes of objects in the system. The technique of SVM is applied which will classify the data into malicious and non-malicious. In the previous study authors proposed various model for privacy preserving which are group based records, K-anonymity etc. In the existing models there are various problems like it affect data utilities, harm the data identifiers. In the research work, the hybrid approach has been designed to ensure data privacy which is based on attribute and data identifiers.

[1]  Muhammad Mazhar Ullah Rathore Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks , 2015, J. King Saud Univ. Comput. Inf. Sci..

[2]  Malik Ahsan Ali,et al.  Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records , 2014 .

[3]  Riyad Alshammari,et al.  Identification of VoIP encrypted traffic using a machine learning approach , 2015, J. King Saud Univ. Comput. Inf. Sci..

[4]  Nabin Kumar Karn,et al.  Network Traffic Classification techniques and comparative analysis using Machine Learning algorithms , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[5]  Rupesh Chandrakant Jaiswal,et al.  Machine learning based internet traffic recognition with statistical approach , 2013, 2013 Annual IEEE India Conference (INDICON).

[6]  Shui Yu,et al.  Big data set privacy preserving through sensitive attribute-based grouping , 2017, 2017 IEEE International Conference on Communications (ICC).

[7]  Reza Saatchi,et al.  Multimedia traffic quality of service management using statistical and artificial intelligence techniques , 2014, IET Circuits Devices Syst..

[8]  S. Jyothi,et al.  Machine Learning Algorithms in Big data Analytics , 2018 .

[9]  Songkuk Kim,et al.  Exploiting Adaptive Multi-interface Selection to Improve QoS and Cost-Efficiency of Mobile Video Streaming , 2015, 2015 IEEE International Conference on Mobile Services.

[10]  Wang-Cheol Song,et al.  Visualization of elephant flows and QoS provisioning in SDN-based networks , 2015, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS).