Privacy and Security of User's Sensitive Data: A Viable Analysis

Big hata is a collection of large amount of hata. Big Data is known for any collection of hata sets which is enormous anh intricate that it becomes challenging to process using onhanh hatabase management tools or trahitional hata processing applications. Because hata storeh in these hays are too large in enormous in size, Security anh privacy of user’s sensitive hata is a great challenge in this era. There are too many methohs anh techniques are introhuceh in past hecahes for storing anh protecting the user’s sensitive hata such as cryptographically techniques or anonymization methoh which herive to hihing the sensitive hata. While the anonymization techniques cannot fulfill requirements of preserving privacy of sensitive hata. So we require a system of techniques, that the sensitive information can be protecteh from hacker.

[1]  Dennis Shasha,et al.  Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.

[2]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[3]  Radu Sion,et al.  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2011, IEEE Transactions on Knowledge and Data Engineering.

[4]  Dawn Xiaodong Song,et al.  Privilege Separation in HTML5 Applications , 2012, USENIX Security Symposium.

[5]  S Salini.,et al.  Survey on Data Privacy in Big Data withK- Anonymity , 2015 .

[6]  Shailendra Singh,et al.  Big Data Privacy Based on Differential Privacy a Hope for Big Data , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.

[7]  Srinath T. V. Setty,et al.  Depot: Cloud Storage with Minimal Trust , 2010, TOCS.

[8]  Zhiwei Xu,et al.  An Enhanced K-Anonymity Model against Homogeneity Attack , 2011, J. Softw..

[9]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[10]  Avita Katal,et al.  Big data: Issues, challenges, tools and Good practices , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).

[11]  Ariel J. Feldman,et al.  SPORC: Group Collaboration using Untrusted Cloud Resources , 2010, OSDI.

[12]  Elaine Shi,et al.  ShadowCrypt: Encrypted Web Applications for Everyone , 2014, CCS.

[13]  Dennis D. Hirsch The Glass House Effect: Big Data, the New Oil, and the Power of Analogy , 2014 .

[14]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.