Enhance privacy in big data and cloud via diff-anonym algorithm

The main issue with big data in cloud is the processed or used always need to be by third party. It is very important for the owners of data or clients to trust and to have the guarantee of privacy for the information stored in cloud or analyzed as big data. The privacy models studied in previous research showed that privacy infringement for big data happened because of limitation, privacy guarantee rate or dissemination of accurate data which is obtainable in the data set. In addition, there are various privacy models. In order to determine the best and the most appropriate model to be applied in the future, which also guarantees big data privacy, it is necessary to invest in research and study. In the next part, we surfed some of the privacy models in order to determine the advantages and disadvantages of each model in privacy assurance for big data in cloud. The present study also proposes combined Diff-Anonym algorithm (K-anonymity and differential models) to provide data anonymity with guarantee to keep balance between ambiguity of private data and clarity of general data.

[1]  Rathindra Sarathy,et al.  Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data , 2011, Trans. Data Priv..

[2]  Josep Domingo-Ferrer,et al.  Big Data Privacy: Challenges to Privacy Principles and Models , 2015, Data Science and Engineering.

[3]  Xiaoyi Zhou,et al.  Differential Privacy of Big Data: An Overview , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).

[4]  Chun Yuan,et al.  Differentially Private Data Release through Multidimensional Partitioning , 2010, Secure Data Management.

[5]  Sylvia L. Osborn,et al.  FAANST: Fast Anonymizing Algorithm for Numerical Streaming DaTa , 2010, DPM/SETOP.

[6]  Shivaprasad Goud,et al.  Data Anonymization Using Map Reduce On Cloud , 2015 .

[7]  Josep Domingo-Ferrer,et al.  t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation , 2015, IEEE Transactions on Knowledge and Data Engineering.

[8]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[9]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[10]  Assaf Schuster,et al.  Data mining with differential privacy , 2010, KDD.

[11]  Daniel A. Spielman,et al.  Spectral Graph Theory and its Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[12]  S. Kavitha,et al.  An evaluation on big data generalization using k-Anonymity algorithm on cloud , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).

[13]  Jemal H. Abawajy,et al.  Privacy models for big data: a survey , 2015, Int. J. Big Data Intell..

[14]  Adeel Anjum,et al.  Differentially Private K-Anonymity , 2014, 2014 12th International Conference on Frontiers of Information Technology.

[15]  Josep Domingo-Ferrer,et al.  Enhancing data utility in differential privacy via microaggregation-based k\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{docume , 2014, The VLDB Journal.

[16]  Josep Domingo-Ferrer,et al.  Improving the Utility of Differential Privacy via Univariate Microaggregation , 2014, Privacy in Statistical Databases.

[17]  Kunal Talwar,et al.  Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[18]  Moni Naor,et al.  On the complexity of differentially private data release: efficient algorithms and hardness results , 2009, STOC '09.

[19]  Andrew McGregor,et al.  Optimizing linear counting queries under differential privacy , 2009, PODS.

[20]  Yuchun Guo,et al.  A differential private collaborative filtering framework based on privacy-relevance of topics , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[21]  Anirban Basu,et al.  k-anonymity: Risks and the Reality , 2015, TrustCom 2015.